What the Sony PlayStation Network Attack Can Teach Us About Database Security
Source: ThreatPost - Posted by Alex   
Server Security Sony’s PlayStation Network was breached between April 17 and April 19 and was taken offline by Sony on April 20. At the time of this writing, the service is still not available and it might not be available until the end of May. Much speculation has ensued on what has actually happened and the information released by Sony does not always match up with what is published elsewhere in print or on the Internet. What is clear is that more than 70 million user records have been stolen.

According to Sony’s notification sent to users, including yours truly, these records contained ‘name, address (city, state, zip), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID’ and possibly ‘profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers’. Finally there is a chance that ‘credit card number (excluding security code) and expiration date’ were also obtained. Some third-party sources claim that, in reality, even more information has been stolen. Alas, this is not the focus of this post and the details will surely emerge in time.

Read this full article at ThreatPost

Only registered users can write comments.
Please login or register.

Powered by AkoComment!