ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
Hot torrents
View Torrent Info: The.Bourne.Identity.2002.BRRip.XviD.AC3-ETRG
View Torrent Info: The.Hollars.2016.HDRip.XViD-ETRG
View Torrent Info: Krampus.The.Christmas.Devil.Returns.2016.BRRip.XviD.AC3-EVO
View Torrent Info: It Had to Be You.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Kids.in.Love.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Fender.Bender.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: End.of.a.Gun.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Sully.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
View Torrent Info: The.Walking.Dead.S07E07.HDTV.x264-FUM[ettv]
View Torrent Info: Westworld.S01E10.WEBRip.x264-FUM[ettv]
View Torrent Info: Shameless.US.S07E10.HDTV.x264-LOL[ettv]
View Torrent Info: Frontier.2016.S01E05.HDTV.x264-KILLERS[ettv]
View Torrent Info: YZ.2016.Marathi.720p.WEB-DL.H264.ESub.AAC2.0-DDR
View Torrent Info: Nenu Sailaja (2016)   EXTRAS 720p UNCUT HDRip x264 [Dual Audio] [Hindi DD 2.0 - Telugu 2.0] Exclusive By -=!Dr.STAR!=-
View Torrent Info: Morgan (2016) 1080p BDRip DUAL DD 5.1 x264 ~ PyZ
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Who Is Responsible For Sony Hack?

Who Is Responsible For Sony Hack?

Who Is Responsible For Sony Hack?

Added: Thursday, June 23rd, 2011
Category: Bit Torrent Freedom > The Industries Of Records, Gaming, Software, Movies
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
Within the past several months, a number of major security breaches occurred, most of them connected to Sony Corporation. The company turned out to be in the center of attention for people hacking whatever system Sony had control over, from their PlayStation Network to their official site. However, Sony wasn’t the only company whose security was breached. Meanwhile, industry observers argue that the community should actually be thanking the hackers attracting attention to security vulnerabilities, which is supposed to make companies pay more attention to the Internet security.

The scheme usually works the following way: someone, having malicious intentions, takes a decision to break in to some online service with the purpose to steal users’ identities and sell them on the black market. Of course, such people don’t care of what will happen to numerous innocent victims. This hacker at least has to invest his time in finding out how to break in to a large company before giving it a try. If he breaks in successfully, he steals a considerable number of identities. This leads us to a point where the company and the public know about the breach, but the crime has already occurred. So, who should get the blame here: the hacker for committing a crime or the company for failing to protect its users’ personal data?

The opinions of the industry observers vary, but the details of the breach alter which side is more responsible for the incident. As for the recent security breaches, the blame is largely placed on the companies that got hacked, particularly at their security departments. People, whose job is to monitor the security of an official website for an international corporation, are expected to at least know something about online security and how to secure a site. Moreover, they should be aware of how hackers are breaking in to sites and find out how this practice can affect their own service and how they can protect their website from intruders.

Actually, everyone who deals with protecting websites from hack tries to break in to their own sites in the first place (for security purposes, of course). This will allow them patch up the sites accordingly. So, when Sony has been regularly getting hacked, it began to seem that either these kinds of attacks were exclusive to the company or its security specialists were not learning from mistakes! At the very least, no other company has stored passwords and personal data in plain text, unencrypted, especially after that serious long-turn security breach and its own promises to fix all the security gaps.

In other words, in this case the observers were almost unanimous in their opinion that all the hacks were wake-up calls for Sony, indicating that the company needed to ensure sufficient funding and resources devoted to online security. This is even truer when taking into account what amount of financial information has leaked that time.

June 23rd,2011

Posted by: 

Date:  Thursday, June 23rd, 2011

Comments (3) (please add your comment »)

posted by (2011-06-23 13:36:43)
DEMONLORD avatarsad when companys dont even know there own security policies and release how weak they are

posted by Blocked (2011-06-24 09:47:40)
menahunie avatarAllot of the blame I put on the software companies putting out applications written so sloppy and wasteful to always allow breaches. If the software was written more simply and compact like in assembly breaches would be allot harder than they are now.
Answer this? Why can a guy who is excellent and very smart also MADE this problem public can write apps in the kilobytes when others take megabytes to write the app to do the same job? Lookup up Gibson Research. He was also attacked and kicked their butts...
Remember the excellent software spinrite? I do and still use it..
Part of the problem for opening allot of systems to breaches was Microcrap allowing access to RAW SOCKETS to name one..
I can go on.
I also believe this is why more new operating systems are being designed and written because of what I have just stated..

posted by (2011-06-27 02:21:43)
PeanutGallery avatarWell I believe Sony deserves it!! also do you guys read what your saying before you submit it cause its hard to understand what your saying when you miss words or use wrong words plus (allot) is spelled (a lot) so when your trying to act like you know what your talking about it might be a good idea to be literate.

Articles Search
Most Popular Stories
Articles Categories
Articles Tags

Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc1