SlideShare a Scribd company logo
1 of 19
How Hackers Potentially Stole 77 Million
User’s Credit Card Details From Sony
How Bad Is It?
Countries Most Affected:
The Sony Hack CreditCardFinder.com.au
United States
Japan
United Kingdom
Europe
Australia
Timeline of Events
 February
The Sony Hack CreditCardFinder.com.au
Timeline of Events
 April
Apr. 17, Sunday
25 million customers’ information exposed.
The Sony Hack CreditCardFinder.com.au
Apr. 19, Tuesday
Sony discovers there has been “an intrusion” into the
Playstation network.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 21, Thursday
Seybold: Sony is “investigating the
cause of the Network outage”.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 26, Tuesday
77 million PlayStation
network accounts
compromised. Sony took 7
days to notify PSN
customers of security
breach.
Timeline of Events
 April
The Sony Hack CreditCardFinder.com.au
Apr. 27, Wednesday
Media stories, lawsuits and threats
directed at Sony.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 2, Monday
Sony reveals that Sony Online Entertainment’s
network had been hacked over 2 weeks ago.
May 3, Tuesday
Sony begins informing their users of the breach.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 9, Monday
Analysts See Billion - Dollar Repair Bill
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 15, Sunday
Sony restarts internet services after hacking debacle.
Timeline of Events
 May
The Sony Hack CreditCardFinder.com.au
May 16, Monday
Amazon cloud servers used to hack the PSN.
The Sony Hack CreditCardFinder.com.au
The Sony Hack CreditCardFinder.com.au
latest target:
SONY
Spokespeople for
anonymous have denied
any role in Playstation
Network hack and have
stated that it isn’t the
anonymous style.
verdict:
probably innocent
anonymous
The Sony Hack CreditCardFinder.com.au
famous attack:
Silicon Valley bigwigs
The attackers first hit a
single employee then
expand through the
network until they’ve found
what they’re looking for -
trade secrets, source code
and intelligence.
verdict:
innocent
china
The Sony Hack CreditCardFinder.com.au
who?:
Bored teenager
Much smaller numbers than
professionals.
The Playstation Network
database is an alluring target
for recreational hackers to
target.
verdict:
maybe guilty
recreational
hacker
The Sony Hack CreditCardFinder.com.au
found at places:
Ukraine and Russia
Attackers will steal databases
and sell routinely over carder
forums and in private
transactions.
verdict:
probably guilty
for-profit
cyberthief
How does
the Sony
fiasco
compare
to past
data
breaches?
The Sony Hack CreditCardFinder.com.au
The Sony Hack CreditCardFinder.com.au
SOURCES:
http://www.develop-online.net/features/1176/Timeline-The-PlayStation-Network-attack-and-
collapse
http://creditcardonlineapplication.net/credit-card-theft-%E2%80%93-the-5-biggest-credit-
card-heists-in-history
http://www.awired.com/threatlevel/2011/04/playstation_hack
http://www.google.com/finance?client=ob&q=NYSE:SNE
http://online.wsj.com/article/SB10001424052748703859304576307664174667924.html
http://www.heraldsun.com.au/news/more-news/sony-restarts-internet-services-weeks-after-
hacking-debacle/story-fn7x8me2-1226056194901
http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service-
lures-hackers-at-pennies-an-hour.html
http://www.theaustralian.com.au/australian-it/japan-stalls-sony-playstation-restart/story-
e6frgakx-1226056625499
http://www.flickr.com/photos/pittaya/4785149065/
The Sony Hack CreditCardFinder.com.au
Presentation brought to you by:
Thank You For Watching

More Related Content

What's hot

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)Molfar
 
Hacking
HackingHacking
HackingVirus
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 

What's hot (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Phishing
PhishingPhishing
Phishing
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Hacking
HackingHacking
Hacking
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Capital One Data Breach
Capital One Data BreachCapital One Data Breach
Capital One Data Breach
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 

Similar to Sony Playstation Hack Presentation

On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdfamcointernationaljam
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfaccuraprintengineers
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfaabdin101
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...Jeremiah Onaolapo
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfanupamele
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOhad Flinker
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicState of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicBojan Simic
 

Similar to Sony Playstation Hack Presentation (20)

On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Hackers
HackersHackers
Hackers
 
Hackers 22
Hackers 22Hackers 22
Hackers 22
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Cred...
 
Hacker !
Hacker !Hacker !
Hacker !
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
Hack
HackHack
Hack
 
Hacker !
Hacker !Hacker !
Hacker !
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan SimicState of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
State of Bitcoin Security - Inside Bitcoins April 2014 - Bojan Simic
 

More from CreditCardFinder

More from CreditCardFinder (6)

0% Balance Transfer for 6 Months
0% Balance Transfer for 6 Months0% Balance Transfer for 6 Months
0% Balance Transfer for 6 Months
 
Debit Cards
Debit CardsDebit Cards
Debit Cards
 
Introductory Offers
Introductory OffersIntroductory Offers
Introductory Offers
 
Business Credit Cards
Business Credit CardsBusiness Credit Cards
Business Credit Cards
 
Balance Transfer Credit Cards
Balance Transfer Credit CardsBalance Transfer Credit Cards
Balance Transfer Credit Cards
 
Reward Credit Cards
Reward Credit CardsReward Credit Cards
Reward Credit Cards
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Sony Playstation Hack Presentation

  • 1. How Hackers Potentially Stole 77 Million User’s Credit Card Details From Sony
  • 2. How Bad Is It? Countries Most Affected: The Sony Hack CreditCardFinder.com.au United States Japan United Kingdom Europe Australia
  • 3. Timeline of Events  February The Sony Hack CreditCardFinder.com.au
  • 4. Timeline of Events  April Apr. 17, Sunday 25 million customers’ information exposed. The Sony Hack CreditCardFinder.com.au Apr. 19, Tuesday Sony discovers there has been “an intrusion” into the Playstation network.
  • 5. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 21, Thursday Seybold: Sony is “investigating the cause of the Network outage”.
  • 6. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 26, Tuesday 77 million PlayStation network accounts compromised. Sony took 7 days to notify PSN customers of security breach.
  • 7. Timeline of Events  April The Sony Hack CreditCardFinder.com.au Apr. 27, Wednesday Media stories, lawsuits and threats directed at Sony.
  • 8. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 2, Monday Sony reveals that Sony Online Entertainment’s network had been hacked over 2 weeks ago. May 3, Tuesday Sony begins informing their users of the breach.
  • 9. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 9, Monday Analysts See Billion - Dollar Repair Bill
  • 10. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 15, Sunday Sony restarts internet services after hacking debacle.
  • 11. Timeline of Events  May The Sony Hack CreditCardFinder.com.au May 16, Monday Amazon cloud servers used to hack the PSN.
  • 12. The Sony Hack CreditCardFinder.com.au
  • 13. The Sony Hack CreditCardFinder.com.au latest target: SONY Spokespeople for anonymous have denied any role in Playstation Network hack and have stated that it isn’t the anonymous style. verdict: probably innocent anonymous
  • 14. The Sony Hack CreditCardFinder.com.au famous attack: Silicon Valley bigwigs The attackers first hit a single employee then expand through the network until they’ve found what they’re looking for - trade secrets, source code and intelligence. verdict: innocent china
  • 15. The Sony Hack CreditCardFinder.com.au who?: Bored teenager Much smaller numbers than professionals. The Playstation Network database is an alluring target for recreational hackers to target. verdict: maybe guilty recreational hacker
  • 16. The Sony Hack CreditCardFinder.com.au found at places: Ukraine and Russia Attackers will steal databases and sell routinely over carder forums and in private transactions. verdict: probably guilty for-profit cyberthief
  • 17. How does the Sony fiasco compare to past data breaches? The Sony Hack CreditCardFinder.com.au
  • 18. The Sony Hack CreditCardFinder.com.au SOURCES: http://www.develop-online.net/features/1176/Timeline-The-PlayStation-Network-attack-and- collapse http://creditcardonlineapplication.net/credit-card-theft-%E2%80%93-the-5-biggest-credit- card-heists-in-history http://www.awired.com/threatlevel/2011/04/playstation_hack http://www.google.com/finance?client=ob&q=NYSE:SNE http://online.wsj.com/article/SB10001424052748703859304576307664174667924.html http://www.heraldsun.com.au/news/more-news/sony-restarts-internet-services-weeks-after- hacking-debacle/story-fn7x8me2-1226056194901 http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service- lures-hackers-at-pennies-an-hour.html http://www.theaustralian.com.au/australian-it/japan-stalls-sony-playstation-restart/story- e6frgakx-1226056625499 http://www.flickr.com/photos/pittaya/4785149065/
  • 19. The Sony Hack CreditCardFinder.com.au Presentation brought to you by: Thank You For Watching