• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

SONY gets hacked....again!!

nublikescake

Senior member
Breaking News

WTH's going on? Anyone got detailed info on this? Is it a network security failure or a software/server breach? One would think a giant like Sony could hire competent people and design a secure system! Anyone remember Amazon vs. Anonymous? Amazon's network stood like a rock. Or are these hackers the real deal?
 
Yawn, ok, sony got hacked yet "again".

The sky is blue and we might get some rain this weekend.

Does anyone have any real news?
 
Educate me, I'm a total tech noob.

I've read bunch of things about 256-bit encryption on my upcoming phone HTC Evo3D (well HTC unlocked it now due to demand). Such encryption would make any brute force attack impossible to crack and would take millions of years.

Why can't Sony do a similar protection? Is it different because it's web?
 
Educate me, I'm a total tech noob.

I've read bunch of things about 256-bit encryption on my upcoming phone HTC Evo3D (well HTC unlocked it now due to demand). Such encryption would make any brute force attack impossible to crack and would take millions of years.

Why can't Sony do a similar protection? Is it different because it's web?

because there's no such thing as "hack proof"

http://www.technewsworld.com/story/70699.html

in 2008 the PENTAGON was hacked..

if the Pentagon, which probably uses encryption not even available to the public, can get hacked.. what's to prevent other sites and companies from getting hacked.?
 
Can someone paint a picture how they actually hack? Their techniques vs protection in layman's terms?
In this case it appears they used an injection technique. This involves typing in SQL commands in the username and password logon fields in order to extract information and gain access. Really simple stuff here. The first thing you try and expect to fail.
 
because there's no such thing as "hack proof"

http://www.technewsworld.com/story/70699.html

in 2008 the PENTAGON was hacked..

if the Pentagon, which probably uses encryption not even available to the public, can get hacked.. what's to prevent other sites and companies from getting hacked.?

yeah, besides staying off the internet, I do think that in theory, if quantum processing ever comes into the working stage, it is supposed to be hack proof, no?
 
I don't know how any of this works, but I assume this is related to the PS# hardware being completely jail-broken about 3 months ago? or whenever that was.

I'd think that those who had experience with this, likewise assumed that Sony used similarly lax security for their networks, and simply started testing everything out? It seems to me that the massive security problems at Sony, from hardware to network, are happening too close to each other to not be related. or maybe that's just too obvious of me?
😀
 
I don't know how any of this works, but I assume this is related to the PS# hardware being completely jail-broken about 3 months ago? or whenever that was.

I'd think that those who had experience with this, likewise assumed that Sony used similarly lax security for their networks, and simply started testing everything out? It seems to me that the massive security problems at Sony, from hardware to network, are happening too close to each other to not be related. or maybe that's just too obvious of me?
😀

I think it probably is just that obvious. Once everyone realized how 'easy' it was to break into the PSN service they started probing around at the others. Sony probably just doesn't have enough resources to go and plug all of the holes at once and definitely doesn't want to take everything offline for the amount of time it would take to plug the gaps.
 
Guess there's a reason why I haven't updated my account info for the Sony Reader Store. I imagine that site will be next.
 
I think it probably is just that obvious. Once everyone realized how 'easy' it was to break into the PSN service they started probing around at the others. Sony probably just doesn't have enough resources to go and plug all of the holes at once and definitely doesn't want to take everything offline for the amount of time it would take to plug the gaps.

but even before PSN, they broke into the actual PS3 hardware to override all of their update services. or something like this. I understood it to be more of a hardware hack than a network hack--which to me, is a bit surprising that they would have the same shitty security behind both?
 
Can someone paint a picture how they actually hack? Their techniques vs protection in layman's terms?

So, imagine Sony's servers are an AIDS-free asshole. And a hacker is diseased infected penis. The penis ejaculates ("injects") diseased infested semen ("SQL, or structured query language") into the asshole ("server"), rendering it diseased and vulnerable.
 
yeah, besides staying off the internet, I do think that in theory, if quantum processing ever comes into the working stage, it is supposed to be hack proof, no?

Quantum encryption is hack proof by the laws of physics as we understand them. But that's really more of a special type of point to point connection than an encryption. In other words, you couldn't use it over an internet connection.
 
So, imagine Sony's servers are an AIDS-free asshole. And a hacker is diseased infected penis. The penis ejaculates ("injects") diseased infested semen ("SQL, or structured query language") into the asshole ("server"), rendering it diseased and vulnerable.


D:


i think i need a shower after reading that
 
Back
Top