SlideShare a Scribd company logo
1 of 19
How Hackers Potentially Stole 77 Million
User’s Credit Card Details From Sony
How Bad Is It?
Countries Most Affected:
The Sony Hack CreditCardFinder.com.au
United States
Japan
United Kingdom
Europe
Australia
Timeline of Events
 February
The Sony Hack CreditCardFinder.com.au
Timeline of Events
 April
Apr. 17, Sunday
25 million customers’ information exposed.
The Sony Hack CreditCardFinder.com.au
Apr. 19, Tuesday
Sony discovers there has been “an intrusion” into the
Playstation network.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 21, Thursday
Seybold: Sony is “investigating the
cause of the Network outage”.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 26, Tuesday
77 million PlayStation
network accounts
compromised. Sony took 7
days to notify PSN
customers of security
breach.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 27, Wednesday
Media stories, lawsuits and threats
directed at Sony.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 2, Monday
Sony reveals that Sony Online Entertainment’s
network had been hacked over 2 weeks ago.
May 3, Tuesday
Sony begins informing their users of the breach.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 9, Monday
Analysts See Billion - Dollar Repair Bill
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 15, Sunday
Sony restarts internet services after hacking debacle.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 16, Monday
Amazon cloud servers used to hack the PSN.
The Sony Hack CreditCardFinder.com.au
The Sony Hack CreditCardFinder.com.au
latest target:
SONY
Spokespeople for
anonymous have denied
any role in Playstation
Network hack and have
stated that it isn’t the
anonymous style.
verdict:
probably innocent
anonymous
The Sony Hack CreditCardFinder.com.au
famous attack:
Silicon Valley bigwigs
The attackers first hit a
single employee then
expand through the
network until they’ve found
what they’re looking for -
trade secrets, source code
and intelligence.
verdict:
innocent
china
The Sony Hack CreditCardFinder.com.au
who?:
Bored teenager
Much smaller numbers than
professionals.
The Playstation Network
database is an alluring target
for recreational hackers to
target.
verdict:
maybe guilty
recreational
hacker
The Sony Hack CreditCardFinder.com.au
found at places:
Ukraine and Russia
Attackers will steal databases
and sell routinely over carder
forums and in private
transactions.
verdict:
probably guilty
for-profit
cyberthief
How does
the Sony
fiasco
compare
to past
data
breaches?
The Sony Hack CreditCardFinder.com.au
The Sony Hack CreditCardFinder.com.au
SOURCES:
http://www.develop-online.net/features/1176/Timeline-The-PlayStation-Network-attack-and-
collapse
http://creditcardonlineapplication.net/credit-card-theft-%E2%80%93-the-5-biggest-credit-
card-heists-in-history
http://www.awired.com/threatlevel/2011/04/playstation_hack
http://www.google.com/finance?client=ob&q=NYSE:SNE
http://online.wsj.com/article/SB10001424052748703859304576307664174667924.html
http://www.heraldsun.com.au/news/more-news/sony-restarts-internet-services-weeks-after-
hacking-debacle/story-fn7x8me2-1226056194901
http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service-
lures-hackers-at-pennies-an-hour.html
http://www.theaustralian.com.au/australian-it/japan-stalls-sony-playstation-restart/story-
e6frgakx-1226056625499
http://www.flickr.com/photos/pittaya/4785149065/
The Sony Hack CreditCardFinder.com.au
Presentation brought to you by:
Thank You For Watching

More Related Content

What's hot

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 

What's hot (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Hacking
HackingHacking
Hacking
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Sony Playstation Hack Presentation

On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdfamcointernationaljam
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfaccuraprintengineers
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfaabdin101
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...Jeremiah Onaolapo
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfanupamele
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOhad Flinker
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 

Similar to Sony Playstation Hack Presentation (20)

On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Hackers
HackersHackers
Hackers
 
Hackers 22
Hackers 22Hackers 22
Hackers 22
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
 
Hacker !
Hacker !Hacker !
Hacker !
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
Hack
HackHack
Hack
 
Hacker !
Hacker !Hacker !
Hacker !
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 

More from CreditCardFinder

More from CreditCardFinder (6)

0% Balance Transfer for 6 Months
0% Balance Transfer for 6 Months0% Balance Transfer for 6 Months
0% Balance Transfer for 6 Months
 
Debit Cards
Debit CardsDebit Cards
Debit Cards
 
Introductory Offers
Introductory OffersIntroductory Offers
Introductory Offers
 
Business Credit Cards
Business Credit CardsBusiness Credit Cards
Business Credit Cards
 
Balance Transfer Credit Cards
Balance Transfer Credit CardsBalance Transfer Credit Cards
Balance Transfer Credit Cards
 
Reward Credit Cards
Reward Credit CardsReward Credit Cards
Reward Credit Cards
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Sony Playstation Hack Presentation

  • 1. How Hackers Potentially Stole 77 Million User’s Credit Card Details From Sony
  • 2. How Bad Is It? Countries Most Affected: The Sony Hack CreditCardFinder.com.au United States Japan United Kingdom Europe Australia
  • 3. Timeline of Events  February The Sony Hack CreditCardFinder.com.au
  • 4. Timeline of Events  April Apr. 17, Sunday 25 million customers’ information exposed. The Sony Hack CreditCardFinder.com.au Apr. 19, Tuesday Sony discovers there has been “an intrusion” into the Playstation network.
  • 5. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 21, Thursday Seybold: Sony is “investigating the cause of the Network outage”.
  • 6. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 26, Tuesday 77 million PlayStation network accounts compromised. Sony took 7 days to notify PSN customers of security breach.
  • 7. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 27, Wednesday Media stories, lawsuits and threats directed at Sony.
  • 8. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 2, Monday Sony reveals that Sony Online Entertainment’s network had been hacked over 2 weeks ago. May 3, Tuesday Sony begins informing their users of the breach.
  • 9. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 9, Monday Analysts See Billion - Dollar Repair Bill
  • 10. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 15, Sunday Sony restarts internet services after hacking debacle.
  • 11. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 16, Monday Amazon cloud servers used to hack the PSN.
  • 12. The Sony Hack CreditCardFinder.com.au
  • 13. The Sony Hack CreditCardFinder.com.au latest target: SONY Spokespeople for anonymous have denied any role in Playstation Network hack and have stated that it isn’t the anonymous style. verdict: probably innocent anonymous
  • 14. The Sony Hack CreditCardFinder.com.au famous attack: Silicon Valley bigwigs The attackers first hit a single employee then expand through the network until they’ve found what they’re looking for - trade secrets, source code and intelligence. verdict: innocent china
  • 15. The Sony Hack CreditCardFinder.com.au who?: Bored teenager Much smaller numbers than professionals. The Playstation Network database is an alluring target for recreational hackers to target. verdict: maybe guilty recreational hacker
  • 16. The Sony Hack CreditCardFinder.com.au found at places: Ukraine and Russia Attackers will steal databases and sell routinely over carder forums and in private transactions. verdict: probably guilty for-profit cyberthief
  • 17. How does the Sony fiasco compare to past data breaches? The Sony Hack CreditCardFinder.com.au
  • 18. The Sony Hack CreditCardFinder.com.au SOURCES: http://www.develop-online.net/features/1176/Timeline-The-PlayStation-Network-attack-and- collapse http://creditcardonlineapplication.net/credit-card-theft-%E2%80%93-the-5-biggest-credit- card-heists-in-history http://www.awired.com/threatlevel/2011/04/playstation_hack http://www.google.com/finance?client=ob&q=NYSE:SNE http://online.wsj.com/article/SB10001424052748703859304576307664174667924.html http://www.heraldsun.com.au/news/more-news/sony-restarts-internet-services-weeks-after- hacking-debacle/story-fn7x8me2-1226056194901 http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service- lures-hackers-at-pennies-an-hour.html http://www.theaustralian.com.au/australian-it/japan-stalls-sony-playstation-restart/story- e6frgakx-1226056625499 http://www.flickr.com/photos/pittaya/4785149065/
  • 19. The Sony Hack CreditCardFinder.com.au Presentation brought to you by: Thank You For Watching