Sony announced on Wednesday that the final piece of its PlayStation Network, the PlayStation Store, is now back online after Sony’s networks were taken down due to a massive security breach. Sony also noted that it has outfitted PlayStation Plus store with new game trials, games, downloadable content, free avatars, and bigger discounts. The company’s “Welcome Back Offer,” which will provide two free games to Sony users as well as 30 days of PlayStation Plus, is in the final stages of testing and will also be available soon. More →
Sony on Tuesday stated that services associated with its PlayStation Network will be fully restored by the end of this week in all regions outside Japan, Hong Kong, and South Korea. Sony also said it would fully restore the Music Unlimited services tied to its Qriocity streaming music offering for the PlayStation 3, PSP and PCs. “We have been conducting additional testing and further security verification of our commerce functions in order to bring the PlayStation Network completely back online so that our fans can again enjoy the first class entertainment experience they have come to love,” said Kazuo Hirai, Sony’s Executive Deputy President, in a statement. “We appreciate the patience and support shown during this time.” Sony recently suffered a series of cyberattacks across various networks that exposed personal data belonging to over 100 million of the company’s customers. Sony is currently working with the FBI to identify the parties responsible for breaching its various digital networks. Hit the break for Sony’s full press release. More →
Sony continues to be targeted in a series of cyberattacks that have resulted in the theft of personal information belonging to over 100 million Sony customers. Following breaches of the company’s PlayStation Network, Sony Online Entertainment, So-net Entertainment and most recently, the Sony’s Greek website, hackers have breached a database associated with Sony Ericsson’s Canadian online shop. Personal data including names, email addresses and passwords belonging to more than 2,000 customers was compromised, but Sony said no credit card numbers were stolen. A Lebanese hacking group called Idahca claimed responsibility for the attack, and it said the information obtained has been leaked on Facebook and Twitter. It is unclear if this latest attack is tied in any way to previous attacks on Sony’s various digital properties. More →
Sony’s ongoing battle with cyberattacks has already left the personal data of over 100 million customers exposed, and now the company has fallen victim to yet another attack. Details are slim for the time being, but Reuters cites a report from Jiji news service in stating that roughly 8,500 people across three countries have been affected by this latest breach. Their personal information has been leaked as a result of an attack on Sony’s Greek website on Tuesday, though it is unclear exactly what data the hackers gained access to. Sony has not yet confirmed the attacks, but its Greek website, sony.gr, was back online at the time of this writing. More →
The Wall Street Journal is reporting that hackers have accessed the customer accounts of Sony subsidiary So-net Entertainment Corp, an ISP, and have stolen about $1,225 worth of redeemable gift points. The news comes just weeks after Sony’s massive security breach, during which private information and 12.3 million credit card numbers were stolen from more than 100 million Sony’s Qriocity and PlayStation Network users. Sony said the So-net hacker tried to break into its systems more than 10,000 times before he or she was able to successfully log-in. The intruder was able to access 201 accounts, and he or she stole the redeemable points from 128 customers. “Although we can’t completely rule out the possibility that there is a connection with the PSN issue, the likelihood is low,” said So-net Entertainment spokesperson Keisuke Watabe, noting that the style of attack was different. So-net does not believe that personal information was taken during the break-in. More →
According to reports from numerous gaming sites, the password reset page for Sony’s PlayStation Network has been exploited. Sony built the page in an effort to allow users, whose accounts were already compromised during a major security breach last month, to reset their security credentials. However, hackers who stole the information from Sony can reset users’ passwords by knowing and account holder’s email address and birthday — information they’ve already stolen. Forum members on Nyleveia have suggested that PSN users create a new email address specifically for use with PSN. Sony has taken the website offline, and said: “Unfortunately this also means that those who are still trying to change their password via PlayStation.com or Qriocity.com will still be unable to do so for the time being.” Sounds like Sony really needs to get those new security measures in place, stat. More →
Capcom senior vice president Christian Svensson has voiced his opinion over the Sony’s massive security breach on the Capcom forums. “As an executive responsible for running a business, the resulting outage [is] obviously costing us hundreds of thousands, if not millions of dollars in revenue that were planned for within our budget,” Svensson said in a public forum response. “These are funds we rely on to bring new games to market for our fans.” Capcom has a storefront that offers users the option to purchase extra game content on the PlayStation Network. Svenesson clarified in another post and added that he — and perhaps Capcom, too — is more frustrated with the hackers than with Sony, which he views as the victim. More →
Sony will access to its PlayStation Network and Qriocity services by May 31st, Bloomberg is reporting. Sony took its networks offline after a confirmed 101 million accounts were compromised and 12.3 million credit card numbers were stolen by hackers. Sony’s president, chairman, and CEO, Howard Stringer, has said Sony is “absolutely dedicated to restoring full and safe service as soon as possible,” and has promised users a “Welcome Back” package that includes a free month of its PlayStation Plus service, as well as credit for the downtime. More →
Following preliminary news of another major security breach, Sony confirmed late on Monday that its Sony Online Entertainment portal has been hacked and the personal data of its users has been compromised. Sony said the cyberattack took place on Sunday, and its online gaming portal was taken offline as an initial countermeasure. The company is currently working with the FBI to investigate the breach, which the company has confirmed may have exposed personal data associated with 25 million online accounts. Sony has also confirmed that 10,700 non-U.S. debit card numbers and 12,700 non-U.S. credit card numbers may have been stolen, though the company said its main credit card database was not compromised. Sony Online Entertainment, or SOE, is a portal that hosts several popular Massively Multiplayer Online PC games such as EverQuest and DC Universe Online. Hit the break for Sony’s letter to SOE users. More →
In what may be one of the largest digital security breaches in United States history, millions of customer email addresses have been exposed as a result of a breach at Epsilon. BGR reported on Saturday that TiVo customer email adresses had been compromised as a result of unauthorized access to online marketing company Epsilon’s servers. Following that report, several other companies have come forward to confirm that their customers’ email adresses may have been exposed. Those potentially affected include customers enrolled in Best Buy’s Reward Zone program as well as customers of Citigroup, J.P. Morgan Chase, TiVo, Barclays, Walgreens, U.S. Bancorp, Capital One, HSN and College Board, which represents almost 6,000 different U.S. colleges and universities. “A subset of Epsilon clients’ customer data were exposed by an unauthorized entry into Epsilon’s email system,” Epsilon said in a statement last week. The company insists that only names and email addresses may have been compromised, and that sensitive information such as social security numbers, credit card numbers and passwords were not accessed.
With no more than a few weeks left to hold the arbitrary title of “world’s best Android phone,” Google’s Nexus S is sweating. In a last-ditch effort to make waves ahead of the dual-core Android phone onslaught set to hit CES on Thursday, the Nexus S is making headlines one last time. Courtesy of the fine folks over at the xda-developers forum, the Nexus S’ Hummingbird processor has been successfully overclocked to 1.2GHz, up from its factory rating of 1GHz. The already silky smooth(ish) UX on the Nexus S is further elevated by the bump in processing power, of course, and those with a need for mobile speed can finally have their hack-appetite sated. Typical you-might-bust-your-gear-and-void-your-warranty warnings aside, intrepid Nexus S owners should hit the read link below if they have any interest in overclocking their kit. More →
The digital rights management (DRM) security used by Microsoft to protect apps in its Windows Phone 7 Marketplace has been cracked, enthusiast blog WPCentral reports. Though the technology needed to do so is not yet in the hands of the general public, the DRM protecting paid applications can now easily be stripped off of apps. If details of the vulnerability used to achieve the DRM crack are made available to the public, unscrupulous programers could use the exploit to develop software that allows users to steal applications and deploy them to Windows Phone 7 devices. Microsoft has not publicly responded to the security hole, though WPCentral claims the company has been made aware of the issue. Hit the break to see Microsoft’s Windows Phone 7 Marketplace security being manhandled in a proof-of-concept video demonstration. More →
Earlier today, BGR broke the news that a possible Facebook glitch or hack was disabling user accounts. We have now received a response from a Facebook spokesperson, who has confirmed that a bug is to blame for the mass-deactivations. Facebook’s official statement is as follows:
Earlier today, we discovered a bug in a system designed to detect and disable likely fake accounts. The bug, which was live for a short period of time, caused a very small percentage of Facebook accounts to be mistakenly disabled. Upon discovering the bug, we immediately worked to resolve it. It’s now been fixed, and we’re in the process of reactivating and notifying the people who were affected.
While the number of disabled accounts is undoubtedly a small percentage of Facbook’s total subscriber base, the number of users impacted by the bug is easily in the thousands. Facebook assured us that it is in the process of restoring affected accounts, however, and that everything should be back to normal soon.
UPDATE: We also asked Facebook about the odd request for a scanned ID which, to us, sounded extremely fishy. As it turns out, these requests were legitimate. Facebook clarified that in some account deactivation cases when no other options are available, users may be asked to provide valid IDs. One of the results of today’s bug was apparently the initiation of this process for affected users.