SONY Attack: How to Avoid Being The Next

As news reports revealed last week, U.S. investigators now have evidence that the hackers who compromised Sony’s computing networks and stole its confidential data gained access to its systems by stealing system administrator credentials.

Unfortunately, while the Sony case is unique in its ties to the planned release of a controversial film, the credential and authentication vulnerability that hackers exploited is something that thousands of companies share worldwide and that has enabled countless other data breaches, including recent attacks against Target, Home Depot, and even Swiss banks….


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s