Page 34 of 35 FirstFirst ... 2432333435 LastLast
Results 331 to 340 of 342



  1. #331
    Senior Member GrandpaHomer's Avatar
    Join Date
    Apr 2005
    Posts
    1,314
    Quote Originally Posted by leukotic View Post
    Definitely not a real Sony site, that's for sure. Funny though.
    I'm pretty sure that both movie as well as the site are genuine - not sure who own's the site directly but it's without doubt affiliated to Sony as well.

  2. #332
    Banned User
    Join Date
    Sep 2010
    Posts
    149
    Yeah your right, searched on IMDB and found what looks like to be a perfect match.
    http://www.imdb.com/title/tt1521197/

    Probably going to be a abysmal movie (political drama -- sound like fun, lol) but is a funny coincidence on the title.

  3. #333
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    26,849

    Sony PSN Japan Update, Publishing Partners Letter Detailed

    Update: PSN is now back online in Japan, and Kaz Harai has made available a http://blip.tv/play/h5NMgr6pNgI statement with all the related details.

    Following news that PSN internal testing is currently underway, today the official PlayStation Japan site has issued an update regarding the PlayStation Network outage alongside details from the official letter Sony sent out to their publishing partners.

    To quote, roughly translated: "PlayStation Network” and “Qriocity” and continued failure, I am sorry indeed. As we told the other day with the latest information in regard to future service restart, will be conducted in stages on a regional basis to ensure the safety of our customers.

    We are preparing to be able to resume service as soon as possible in Japan, and is now doing the verification stage for ensuring the safety and security, providing more advanced. Server to complete the relocation of more secure facilities, further strengthening the encryption, firewalls and expansion of new customers with peace of mind again on “PlayStation Network” and “Qriocity” to stay.

    We also are supporting the monitoring and the introduction of warning systems to facilitate early detection of cyber attacks, subjected to a system upgrade intended to eliminate vulnerabilities, established a system to ensure information management to protect important personal information of customers.

    For those of you committed to ensuring safety, but would take some time for some time now, humbly thank you for your understanding. For the latest information, this website will guide you at any time. To everyone of our customers and partners, we deeply apologize for the inconvenience and inconvenience."

    In related news, http://www.industrygamers.com/news/playstation-network-heres-the-official-letter-sony-sent-to-publishing-partners-exclusive/ has shared a copy of the official letter Sony SVP Rob Dyer sent out regarding PSN to their publishing partners, as detailed below:

    Dear Partner:

    As you know, certain PlayStation Network, Qriocity and Sony Online Entertainment service user account information was compromised in criminal attacks against our networks. I want to assure you, as a PlayStation partner, that it is Sony’s top priority to restore our network operations and see that business is returned to usual as soon as possible.

    We are working around the clock to restore service, but will do so only when we can ensure that the network can operate safely and securely. In the meantime, we greatly appreciate your patience, understanding and goodwill.

    What Happened?
    • On Tuesday, April 19, 2011, Sony discovered that several PlayStation Network servers unexpectedly rebooted themselves and that unplanned and unusual activity was taking place on the network. This activity triggered an immediate response.

    • Sony mobilized a larger internal team to assist the investigation of the four suspect servers. That team discovered the first credible indications that an intruder had been in the PlayStation Network system, and six more servers were identified as possibly being compromised. Sony immediately decided to shut down all of the PlayStation Network services in order to prevent any additional damage.

    • The scope and complexity of the investigation grew substantially as additional evidence about the attack developed.

    • The forensic teams were able to confirm that intruders had used very sophisticated and aggressive techniques to obtain unauthorized access, hide their presence from system administrators and escalate privileges inside the servers. Among other things, the intruders deleted log files in order to hide the extent of their work and activity within the network.

    • On Sunday May 1, using information uncovered by the forensic teams, engineers at Sony Online Entertainment (SOE) discovered that data had also been taken from their servers. They, too, shut down operations and on Monday, May 2, announced the discovery.

    What Data Are Affected?

    As you may know, personal data was stolen from approximately 77 million PlayStation network and Qriocity service accounts.

    As of this writing, there remains no evidence that the credit card information was stolen and the major credit card companies are still reporting that they have not seen an increase in fraudulent transactions due to this event.

    What Steps Are Being Taken?

    We have taken aggressive action to give consumers peace of mind, protect them against the abuse of their data, and enhance our security systems moving forward.

    We have already advised our consumers in the U.S. that we will offer complimentary identity theft protection services through a leading provider, including an insurance program of up to $1 million. Similar programs are being developed in other markets around the world.

    In addition, Sony is taking a series of steps to enhance security of our network infrastructure. They include but are not limited to:
    • adding additional automated software monitoring and configuration management to help defend against new attacks;

    • enhanced levels of data protection and encryption, as well as additional penetration and vulnerability testing;

    • enhanced capabilities to detect software intrusions within the network, unauthorized access and unusual activity patterns;

    • implementation of additional firewalls;

    • expediting a planned move of the system to a new data center in a different location with enhanced security; and

    • appointment of a new Chief Information Security Officer.

    Finally, to thank our customers for their patience and loyalty, we are offering them “welcome back” packages as soon as the networks are restored, including free downloads of selected PlayStation entertainment, 30 days of free service as well as service extensions for the number of days PSN and Qriocity services were unavailable, with similar benefits for Music Unlimited subscribers.

    Looking Ahead

    We of course deeply regret that this incident has occurred. We are working closely with the FBI to identify and apprehend the culprits who committed this crime against our consumers, our partners and our company. I know you can appreciate how widespread the problem of cybercrime is in society today. Although no company is immune, we are confident our consumer data will be protected by some of the best security measures available today.

    As a valued partner we aim to keep the lines of communication open so that you are aware of our progress. Our focus has been to confirm the security of the networks, protect customer data and get the services back on line as quickly as possible. We will do our best to respond to all of your inquiries and we will do everything we possibly can to support you.

    We are doing everything we can to bring these services back online as soon as possible. We will update you with more information as soon as we can, but please call your account executive if you have further questions. We thank you for your patience and look forward to moving ahead together in the months and years to come.

    Very truly yours,

    Rob Dyer

    SVP, Publisher Relations




    Sony PSN Japan Update, Publishing Partners Letter Detailed

    Sony PSN Japan Update, Publishing Partners Letter Detailed

    Sony PSN Japan Update, Publishing Partners Letter Detailed

    More PlayStation 3 News...

  4. #334
    Senior Member GrandpaHomer's Avatar
    Join Date
    Apr 2005
    Posts
    1,314
    Again - just repeating the old song...
    Quote Originally Posted by PS3 News View Post
    Among other things, the intruders deleted log files in order to hide the extent of their work and activity within the network.
    Sony aparently never heard of proper and most of all secure loging to the external / remote systems which has no other direct access from monitored system apart of storing the sent logs itself and indeed constantly backing them up and so on - clueless.

  5. #335
    Senior Member syphonlord's Avatar
    Join Date
    Jan 2010
    Posts
    152
    OMG this is really getting boring now, i'm sick of hearing about it. SONY hurry up and sort it out, your not building swiss watches so why is it taking so long. Grrrrrr

  6. #336
    Senior Member daveshooter's Avatar
    Join Date
    Nov 2010
    Posts
    414
    • appointment of a new Chief Information Security Officer.

    Who's that then? Not our Geo lol.

  7. #337
    Senior Member elser1's Avatar
    Join Date
    Oct 2010
    Posts
    2,418
    Quote Originally Posted by daveshooter View Post
    • appointment of a new Chief Information Security Officer.

    Who's that then? Not our Geo lol.
    hah wouldn't be suprised eh!

    that would suck!

  8. #338
    Member anon777's Avatar
    Join Date
    Jan 2011
    Posts
    67
    i know right..

  9. #339
    Senior Member GrandpaHomer's Avatar
    Join Date
    Apr 2005
    Posts
    1,314

    Amazon Server Said to Be Used in Sony Attack

    Bloomberg reports:

    Amazon.com Inc. (AMZN)’s Web Services cloud- computing unit was used by hackers in last month’s attack against Sony Corp. (6758)’s online entertainment systems, according to a person with knowledge of the matter.

    Hackers using an alias signed up to rent a server through Amazon’s EC2 service and launched the attack from there, said the person, who requested anonymity because the information is confidential. The account has been shut down, the person said.

    The development sheds light on how hackers used the so- called cloud to carry out the second-biggest online theft of personal information to date. The incursion, which compromised the personal accounts of more than 100 million Sony customers, was “a very carefully planned, very professional, highly sophisticated criminal cyber attack,” Sony has said.

    Drew Herdener, a spokesman for Seattle-based Amazon, declined to comment.

    “We’re continuing to work with law enforcement in an ongoing investigation into the situation,” said Patrick Seybold, a U.S. spokesman for Tokyo-based Sony. “As such, we will not comment further on this matter.”

    The hackers didn’t break into the Amazon servers, the person said. Rather, they signed up for the service just as a legitimate company would, using fake information.

    Even so, the breach at Amazon is likely to call attention to concerns some businesses have voiced over the security of computing services delivered via others’ remote servers, referred to as cloud computing.

    Cloud security is Amazon’s top priority, Chief Executive Officer Jeff Bezos said at an event sponsored by Consumer Reports magazine this week.

    Rented Servers

    “Data security is one of these great dynamic situations where the bad guys get better, and the good guys have to keep getting better too -- it’s not a static situation,” Bezos said, Fast Company’s website reported. “I don’t think this is ever going away -- it’s like trying to say that you’re going to get crime to go away.”

    The use of a hijacked or rented server to launch attacks is typical for sophisticated hackers. The proliferation of server farms around the globe has made such misdirection easier, said E.J. Hilbert, president of the security company Online Intelligence and a former FBI cyber-crime investigator.

    The Federal Bureau of Investigation will likely subpoena Amazon as part of its investigation process, or it may try to obtain a search warrant, Hilbert said.

    “The subpoena will give law enforcement a history of the transactions,” or who had access to the specific Internet address at that time, Hilbert said. “The search warrant will get them more detailed information, including payment information and which credit card was used.”

    Amazon Service

    Herdener declined to say whether Amazon has been subpoenaed or served with a search warrant.

    FBI Special Agent Darrell Foxworth, a spokesman for the agency’s San Diego office, said he couldn’t comment on whether the agency had served Amazon with a search warrant or subpoena.

    “We are following up on each and every lead,” Foxworth said.
    Source: http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html

    And just on the side note:
    “The search warrant will get them more detailed information, including payment information and which credit card was used.”
    Surely only idiot would use his / her own credit card for that - it it was so "highly sophisticated criminal cyber attack" then they'd either use the stolen card or prepaid one. Either way this lead would be pretty much useless. And indeed, in the same terms - from which location / IP was the transaction performed and any consequentuall access to the rented cloud space done.

    And - for those liking the bit of conspiracy - why not assume that even the Amazon "failure due the the update / backup" was not for example another part of the cover up of the attack to Sony?
    Last edited by GrandpaHomer; 05-14-2011 at 07:14 AM Reason: Automerged Doublepost

  10. #340
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    26,849
    Interesting indeed, +Rep for the update GrandpaHomer.

 


 
Page 34 of 35 FirstFirst ... 2432333435 LastLast