Feeds

Sony BMG Greece hacked

Hackers 7, Sony 0. Game over

Security for virtualized datacentres

Updated Sony BMG Greece has became the latest property of the entertainment giant to be hacked. The miscreants attacked over the weekend.

The Hackers News uploaded sample extracts from a database of users' names and email addresses onto pastebin after hackers who broke into SonyMusic.gr sent them a dump from their hack. The data as uploaded omits telephone numbers and password hashes that the unidentified hackers claimed to have swiped from the site.

The techniques used to pull off the attack are unclear, but some form of SQL injection-based assault following the use of automated scanning tools to find vulnerable Sony websites seems probable, net security firm Sophos notes.

The high-profile PlayStation Network hack has made Sony properties worldwide a prime target for hackers. A steady stream of vulnerable websites have been discovered as part of a process that is starting to resemble kicking someone when they are down. It's likely that any corporation subjected to this level of intense scrutiny would prove similarly insecure. ®

Security for virtualized datacentres

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.