I'm just relieved that it sounds like CC info was encrypted. If thats the case, that is a HUGE concern eliminated for me. This whole situation has been really unfortunate to say the least, but the silver lining in it for me personally, has been that is has become a good opportunity to re-prioritize my free time. I dont want to see Sony go down in flames, as I know this was a particularly malicious attack, but I'm glad they are finally taking the time to do what they should have done a long time ago with their servers.....maybe it will even result in more server stability and improved customer relations. Imagine that! lol Take care everyone riginal:
For anyone interested, I found this on the site of the attorney that is going to sue Sony about all this. It is the actual complaint form apparently. http://www.techfirm.com/storage/JohnsvSony-Complaint-FINAL-stamped.pdf
gPlayStation Networkh áŠQEƒƒ“ƒeƒiƒ“ƒXî•ñ | ƒvƒŒƒCƒXƒe[ƒVƒ‡ƒ“® ƒIƒtƒBƒVƒƒƒ‹ƒTƒCƒg ,link for JP (nihon) translation of the psn being down ,not sure how many Japanese come on this site but its their If you want to read
Fire's quote is based on this. Around a week from yesterday= May 3rd or 2nd or 1st. So all of us will find out soon enough...
How can you spot a lawyer walking down the street? He will have his hands in someone else’s pockets. How do you tell the difference between a lawyer and a catfish? One wallows in the mud and is a blood- sucking scavenger — the other is a fish!
OMG ,sorry just reading on past posts, and that lawsuit against SCEA is just pathetic ,who do some people think they are jumping on the bandwagon for a quick buck ,I bet they don't even own a PS3 grrr ...
I'm wondering how they actually go about finding a person (or people) who does something like this. I have to assume the culprits arent dumb enough to use computers from anywhere where they can be tracked by IP address or whatever, but what else can they really do to physically locate a computer "hacker"? I've always been curious about that....must be like putting pieces of a puzzle together like some other hard-to-solve crimes but even harder because its mainly electronic evidence. I bet its pretty fascinating work actually and I'm glad there are people out there who know how to catch these fools.
Hopper they use what is known as zombie computers. They are computers they have been taken over with a Trojan and or other virus's. They have millions of computers this way. They then use their IP address for all kinds of malicious attacks like DDOS attack etc. Whereas there are all sorts of programs that can track most of this activity. So they are not really immune to detection now a days. An easy way to protect your system from becoming a zombie. You must use a firewall that does not allow outbound traffic. Most virus scanner company's like McAfee do not do that. The free windows firewall does. The virus scanner can not stop most trojans and virus's now a days. Once in it connects with their mother server and downloads malicious software to your computer. Then good luck trying to get rid of it. Just food for thought... Added note; I noticed a new wave of virus's using java. Also beware of updates to java flash and Adobe programs. You'll receive a update notice from these programs. I strongly advise do not use these update pop ups. Instead go directly to that site and get any update there....
They start by rounding up a group of usual suspects from dorky internet sites with names like haxxors.org, generally men in the 18-30 age bracket who still reside in their mums' basements. Then they tease them mercilessly about being virgins until one of them caves and rats out the culprits. Or they just wait until someone completes a transaction for $16,000,000,000.00 worth of internet porn. That narrows down the search pretty quickly.
Ah ok thx...obviously I'm not very knowledgable on a lot of that--hell, I can barely use a keyboard sometimes. lol But let's say they launched the "attack" from a computer in a public location or just used a computer to do their thing and then got rid of the whole computer altogether? Seems like they could do a lot to make sure that they could never actually be linked to a particular computer. Its just always been kind of interesting to me as to how they go about finding the person (or people) if they are smart enough to make sure that they dont leave any sort of trail. I do know that there are cyber-crime specialists and actual "computer forensics" (?) experts, but it still must be pretty tough in some cases.
I took a Network forensics class (only teaches the basics though) before and it's somewhat like a needle in a haystack kind of process. It's really time consuming and backtracking to the hacker can take months. If the hacker is really wise, that person will use every other network so it's hard. You need to get warrants for those network to hand over their logs also. Just an example: Sony <-> hacked server 2 <-> Hacked computer 2 <-> Hacked server <-> Hacked computer <-> Proxy server <-> Independent server <-> Network Provider <-> Hacker computer
LOL Liza! I knew you might be able to shed some light on it for me! :tounge: Funny stuff there....good to hear from you--hope you are doing well.
Yeah. I can only guess. Network Forensics. What country? What part of that country? Cyber-fingerprints? Check message boards for clues? Friend brags to friend? I am not a Cyber-detective. I bet if you googled hard enough you could satisfy your curiosity.
Interesting faga--I bet that class was real interesting. I can only imagine how time-consuming and tedious that kind of work is. I bet some of the people who work in that field are former hackers themselves....people that can offer insight from experience. @strider--ok I saw the rest of your post now--thx...good info there @kane--good idea to get some info on Google--I'll check it out and see if I'm ready to become a cyber-detective..........NOT lol. Take it easy
This is good news given I had my Credit Card on my NA account. http://massively.joystiq.com/2011/0...k-credit-card-info-appears-to-be-safe-no-una/ __ PlayStation Network credit card info appears to be safe: 'No unauthorized activity relating to Sony' by Justin Olivetti on Apr 28th 2011 5:30PM It looks like the beleaguered Sony finally caught a break. The company, which has struggled for over a week following a hacker attack that stole massive amounts of player information, says that it looks as though user credit card information remains secure and encrypted. It turns out that Sony had encrypted some personal info but not all of it. Gamespot also reports that several financial companies, including MasterCard, WellsFargo and American Express, have witnessed "no unauthorized activity relating to Sony." Sony's Patrick Seybold passed along the positive news: "The entire credit card table was encrypted and we have no evidence that credit card data was taken. The personal data table, which is a separate data set, was not encrypted, but was, of course, behind a very sophisticated security system that was breached in a malicious attack." Sony's PlayStation Network is still offline while it's rebuilt with a higher level of security. The company saw its shares drop 4.5% today on the Tokyo exchange to $27.71.
Everything is traceable Kane. The only problem is countries like Russia and China along with many eastern Europeans. Will not cooperate with our law enforcement. Most well organize computer crime perpetrators use these countries as havens...
Strange that it took Sony over a week to know what their own encryption policy was about Credit Cards of it's customers that they keep on file?
About 10 years ago there was a mouse in the pepsi can scam. Most people should remember that. Now I'm reading reports of people saying this and that has been to charged to their CC and debit cards. They will pay highly for trying to cash in on this lol....