Page 1 of 2 12 LastLast
Results 1 to 16 of 25

Thread: News - Sony pictures loses 1,000,000 passwords

  1. #1
    HEXUS.admin
    Join Date
    Apr 2005
    Posts
    31,709
    Thanks
    0
    Thanked
    2,067 times in 719 posts

    News - Sony pictures loses 1,000,000 passwords

    Further security breaches reveal yet more unencrypted data.
    Read more.

  2. #2
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    The message for now, though, seems to be that if you've ever handed Sony any personal data you should expect it to be made public by a hacker at some point.
    And, by direct extrapolation, you should be concerned about that threat when you hand personal data to ANY organisation. Just because some others haven't hit the headlines yet, does that mean they have better security? Or that they haven't yet been targeted? Or that they have been targeted and had stuff compromised but don't know it? Or that they know it but, when perhaps told "pay up or we go public" they paid up (and I've no idea if that happened with Sony and they refused).

    Put it this way. A hacker can't gain data about you from an organisation if that organisation doesn't have it. So, my advice is to think carefully, when personal info is requested, as to whether it's in YOUR interest to give it, or to give all of it.

    Sometimes, releasing personal information is in your interests, and sometimes, it's unavoidable if you want a given service, in which case, I think about how much I want that service. For instance, I was after double glazing a while back. I redid the whole house. One company quoted about £14,000. A similar company did not want to attend unless I gave them a phone number, and I am not giving a double glazing company my home phone number (or my mobile, for that matter). And they would not attend to give a quote unless I did. Result .... they lost the business. Well, they're entitled to require the phone number, but it was for their convenience (avoiding wasted trips) not mine. So I gave them a choice .... come and quote without it, or don't come. They chose not to come. I'm sure the company I used in the end are quite happy that a couple of major, brand-name competitors operate that policy.

    Anyway, back on topic. The only way we can be sure that out personal data is not compromised is to not give it out. That suggests being very selective about who we give it to, and what information we give and for what reason, if we want to minimise our personal exposure, because this problem for Sony is likely to be the tip of the iceberg, not the whole iceberg.

  3. #3
    Senior Member Brewster0101's Avatar
    Join Date
    Dec 2007
    Location
    UK
    Posts
    2,614
    Thanks
    45
    Thanked
    54 times in 44 posts
    • Brewster0101's system
      • Motherboard:
      • Asus m5a99x evo
      • CPU:
      • AMD FX 8350
      • Memory:
      • 8GB (2x4) Corsair Vengence DDR3 1600mghz
      • Storage:
      • Western Green 3TB + Samsung 850Evo 512MB SSD, + 2TB NAS
      • Graphics card(s):
      • MSI 280X
      • PSU:
      • Corsair AXi760
      • Case:
      • Corsair 650D
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • LG 27" 27EA63 IPS LED
      • Internet:
      • 120Mb Bt

    Re: News - Sony pictures loses 1,000,000 passwords

    Is true that everyone wants as much details as possible when they do not need such information. Like registering on forums and like, they don't need your address details or phone number. Why does Sony have this information. All they need is a user name, password and email address.

    I hope Sony get a good whoop ass kicking by some lawyers over this.

    Sony stinks of arrogance and I am happy if they get thrown to the wall on this.

  4. #4
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable

    Re: News - Sony pictures loses 1,000,000 passwords

    You'd think they would have learnt from the PSN break-in, and immediately convert all the passwords they have stored into hashes. There's no legitimate reason to store passwords in plaintext, ever.
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  5. #5
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,826
    Thanks
    161
    Thanked
    358 times in 288 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by aidanjt View Post
    You'd think they would have learnt from the PSN break-in, and immediately convert all the passwords they have stored into hashes. There's no legitimate reason to store passwords in plaintext, ever.
    Not just hashes. They should be salted as well.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  6. #6
    Pseudo-Mad Scientist Whiternoise's Avatar
    Join Date
    Apr 2006
    Location
    Surrey
    Posts
    4,274
    Thanks
    166
    Thanked
    386 times in 233 posts
    • Whiternoise's system
      • Motherboard:
      • DFI LANPARTY JR P45-T2RS
      • CPU:
      • Q6600
      • Memory:
      • 8GB DDR2
      • Storage:
      • 5.6TB Total
      • Graphics card(s):
      • HD4780
      • PSU:
      • 425W Modu82+ Enermax
      • Case:
      • Silverstone TJ08b
      • Operating System:
      • Win7 64
      • Monitor(s):
      • Dell 23" IPS
      • Internet:
      • 1Gbps Fibre Line

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by aidanjt View Post
    You'd think they would have learnt from the PSN break-in, and immediately convert all the passwords they have stored into hashes. There's no legitimate reason to store passwords in plaintext, ever.
    Worth mentioning that a really easy way to check this is to ask for a password reminder on your favourite websites. If you get your password back in plaintext, then you should consider what you have stored on that site and what else you use that password for.

    It's not implicit that if they send a "reset your password" email, rather than just telling it to, you that your data is encrypted, so be aware of that too.

    Of course you can always fill in the forms with dummy data - there's nothing stopping you.

  7. #7
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by aidanjt View Post
    You'd think they would have learnt from the PSN break-in, and immediately convert all the passwords they have stored into hashes. There's no legitimate reason to store passwords in plaintext, ever.
    I can think of a few exceptions, RSA private key passwords and password managers for instance. But generally, I completely agree - where there isn't a very good reason to not store a hashed password there's no excuse for storing them in plaintext.

    Quote Originally Posted by badass View Post
    Not just hashes. They should be salted as well.
    This too, there are plenty of rainbow tables out there and considering the number of people who have very simple passwords (and use the same one for everything), there is again, no excuse for not using them.

    Quote Originally Posted by Whiternoise View Post
    Worth mentioning that a really easy way to check this is to ask for a password reminder on your favourite websites. If you get your password back in plaintext, then you should consider what you have stored on that site and what else you use that password for.

    It's not implicit that if they send a "reset your password" email, rather than just telling it to, you that your data is encrypted, so be aware of that too.

    Of course you can always fill in the forms with dummy data - there's nothing stopping you.
    I only really use legitimate data where it's absolutely necessary, when shopping for instance. I also frequently make use of disposable emails from mailinator, for example. There is a simple way to guard against stuff like this - use a password manager. Yes, you do get people who 'don't trust them' (despite not knowing a thing about them) but fail to understand it's a heck of a lot more secure than using the same 6 character dictionary word for everything from banking to forums...

  8. #8
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by Whiternoise View Post
    ....

    Of course you can always fill in the forms with dummy data - there's nothing stopping you.
    Depends what the site is for, and what you've agreed to. It's probably not a good idea if, for instance, it's your bank. It may well be thee case that at the least, it's breach of contract, and puts your account at risk if they catch you doing it.

    For that reason, my attitude is that if such data is optional, I don't include it. If it's mandatory, I think very carefully about whether I want whatever that site offers badly enough to give it up. And for things like phone numbers and email addresses, it's why I have "burnable" instances of both - if they get abused, I dump them.

    On the other hand, there's sometimes a downside to not filling it some data. If you want help with your PC, on here, then it may ell help to have filled in profile fields. But it's optional.

    But for "security" data, personally, I will not EVER provide accurate data to anyone that doesn't have a valid reason to know, like banks or the government. If a forum wants DoB, they'll get nothing or a fictional one if it's mandatory, and I never use things like my mother's maiden name, including for (or rather, especially for) sites where security matters.

    It's impossible to keep all personal data personal in today's society, but I'm very selective about who I tell what. You cannot prevent risks to personal data, unless you have a hankering for being a monk in a secluded retreat, but you can minimise them.

  9. #9
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by aidanjt View Post
    You'd think they would have learnt from the PSN break-in, and immediately convert all the passwords they have stored into hashes. There's no legitimate reason to store passwords in plaintext, ever.
    Even hashes have their limitations, especially if you know how the hash is calculated, and have database access.

    Years ago (and nor on Hexus) I ran a little check. I ran various standard passwords (like "password" and "letmein", etc) though an MD5 hash generator, and then did a database search on a fairly large forum database. The number of hits was quite shocking.

    A hash is decently secure against outsiders, but not at all secure against insider access unless the person creating the password avoids the obvious choice of passwords, like those.

    Of course, anyone with more intelligence than a watermelon might use a password like those on forums, but won't on something that matters, like a bank.

  10. #10
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by watercooled View Post
    .... There is a simple way to guard against stuff like this - use a password manager. Yes, you do get people who 'don't trust them' (despite not knowing a thing about them) but fail to understand it's a heck of a lot more secure than using the same 6 character dictionary word for everything from banking to forums...
    And even password managers can be a risk if not used sensible. For example, anyone that has access to your PC can access the contents of your password manager if you're daft enough to use an insecure master password.

    And there's another risk. If you out all your eggs in one basket, for heaven's sake, don't drop the basket. I know someone that pull everything inside a password manager, from bank access details to forums passwords, and didn't keep a backup. Yup, one friend hard disk later, they were in tears.

    I do use a password manager. But my master copy is on a device that's NEVER connected to my network other than very rare occasions for system updates, and that never happens when the network router is on. And there are backup copies of that master data on several different types of media, including non-volatile and one copy which, sometimes is a bit out of date but is about 100 miles from where I keep the device. Even in the event of an utter disaster, like my home burning down, I can still get most of my important data, albeit sometimes a bit old, back.

  11. #11
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Oh I'd be wrong to say they are a complete bullet-proof solution but I think they would rarely be worse then using the same rubbish password for everything. For people I know will not backup/use weak passwords I will normally say don't put anything important (bank/paypal) in with less critical stuff (MyFace, etc), try to think of and remember a good, long, pass sentence as the master password and IIRC LastPass (one I often recommend now) does keep secure backups automatically on their servers.

  12. #12
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by watercooled View Post
    Oh I'd be wrong to say they are a complete bullet-proof solution but I think they would rarely be worse then using the same rubbish password for everything.....
    Absolutely.

    Quote Originally Posted by watercooled View Post
    .... For people I know will not backup/use weak passwords I will normally say don't put anything important (bank/paypal) in with less critical stuff (MyFace, etc), try to think of and remember a good, long, pass sentence as the master password and IIRC LastPass (one I often recommend now) does keep secure backups automatically on their servers.
    It's horses for courses, different strokes for different folks. Any password manager that wants to talk out onto the net is precisely one I would never touch. In fact, I've got such access blocked, just in case. But .... for the type of person you describe, it's a good idea. Storing passwords on someone else's server, especially if they know they are passwords, is a huge no-no for me, but that's because I take my own precautions, and take them seriously. If you don't, that type of storage is certainly likely to be better than not having a backup. Horses for courses.

  13. #13
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by watercooled View Post
    I can think of a few exceptions, RSA private key passwords and password managers for instance. But generally, I completely agree - where there isn't a very good reason to not store a hashed password there's no excuse for storing them in plaintext.
    Oh yeah, obviously with that kind of problem non-reversible cyphers are not a solution. Although though it would still be insane to not use some reversible encryption on the password file (and thus, in keeping with the sanity rule regarding the storage of passwords in plaintext. )
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  14. #14
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    It's not likely I'd put something like an online banking password in an online password manager myself, but I'm a bit over-cautious and it's probably no less secure than having a separate, memorable password for that sort of stuff. But I really like to know the internals of such software, and LastPass seems very over-engineered and they seem to have covered all the angles (obviously we can never be certain any software is completely secure). Your passwords are never stored anywhere in plaintext and they use client-side encryption so you're not relying on them keeping their databases secure. The way they reacted to that recent unknown traffic deal also says to me they are very concerned about the security of their software (if you don't know, they explain it on their blog but they basically did everything they could to ensure everyone was OK, also risking their reputation, just because they had some unexpected network traffic - something I'm sure most companies would completely ignore or not even notice).

  15. #15
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by aidanjt View Post
    Oh yeah, obviously with that kind of problem non-reversible cyphers are not a solution. Although though it would still be insane to not use some reversible encryption on the password file (and thus, in keeping with the sanity rule regarding the storage of passwords in plaintext. )
    Yeah for a huge company like Sony I'm sure they should be able to use something like TPMs where they need reversible encryption.

  16. #16
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by watercooled View Post
    .... The way they reacted to that recent unknown traffic deal also says to me they are very concerned about the security of their software (if you don't know, they explain it on their blog but they basically did everything they could to ensure everyone was OK, also risking their reputation, just because they had some unexpected network traffic - something I'm sure most companies would completely ignore or not even notice).
    True enough, and I have nothing against them beyond a cynical approach .... or at the very least, a rather cautious one.

    Here's an example. A few years ago, I was preparing to do some sub-contract work for a friend's company (he was MD and major shareholder). I read the contract, and pointed out I wasn't signing it as it stood. Some of the conditions were unduly onerous and one-sided. For example, I was expected to provide unlimited indemnity for their computers if they received a virus on an email from me, and that included paying for unlimited professional consultancy to rectify the problem and clean their systems. It was unfair because it imposed no duty on them to take competent precautions that ought to protect them against such an event, because to paid no attention to whether I had taken precautions and was just unlikely enough to have a new attack get past me. And also, it was unfair because while they expected me to indemnify them, they were not prepared to similarly indemnify me against damage caused by a virus from them.

    So I refused. My friend was a bit miffed that I thought he would activate that clause. After all, we're friends, and it was a clause inserted by his lawyers into their standard contract. So I pointed out that, right now, he ran the company and would personally be responsible for taking, or vetoing, that action. But what if he retires and sells the company? Even after he's gone, that contract would remain actionable and a new owner wouldn't be a friend. I wasn't prepared to sign a contract with a liability that could have bankrupted me and cost me my home over what was a relatively trivial job with a earning capability of a few grand. It simply wasn't a risk worth taking. We removed the offending clauses. Other people just signed up, without reading (or at least, without understanding) the implications.

    My point is that while a given company, or software house, might be reputable and responsible now, there's no guarantee they will stay that way. Once they have personal data, they have it. On the other hand, no matter how they change in the future, they can't abuse what they don't have. Oh, and reputable and responsible or not, it's hard to guarantee absolutely against insider abuse of access. After all, ask Wikileaks and their "victims".

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •