Sony warns users of data loss from PlayStation network hack
With network down 6 days and counting, Sony admits security breach
Computerworld - It's been six days and the PlayStation Network is still offline, and now Sony has acknowledged that the problem involved a security breach.
The online multiplayer gaming site, along with Qriocity, Sony's cloud music subscription service, went down last Wednesday and may not be back for another week.
Today, the company posted information online admitting that the hack had breached users' account information, including name, address, birth date, purchase history and online ID.
Patrick Seybold, a senior director at Sony, also noted in the blog post that there's no evidence users' credit card information was stolen. However, he added that "out of an abundance of caution," Sony is advising users that their credit card number and expiration date may have been obtained.
"We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network," the company wrote. "We thank you for your patience as we complete our investigation of this incident, and we regret any inconvenience. Our teams are working around the clock on this, and services will be restored as soon as possible."
Users were first frustrated with their inability to get online and play their favorite games; now, they're frustrated about the security breach and what it might mean for them financially. And they've been taking to Twitter to vent about it.
Tylerbaird tweeted: "I hate to say it, but could this be the death of the #PlayStation? Sounds like the hackers even took the kitchen sink."
And Ctrlzee tweeted: "Another upsetting thing about the PS3 data theft - you can't even protect your account by changing your password since the service is down."
Dan Olds, an analyst with The Gabriel Consulting Group, said the site outage alone was causing trouble for Sony. The data breach acknowledgement just heaps on more.
"This is the nightmare scenario for any videogame network vendor," said Olds. "Not only were they hacked, but it's taken them down for almost a week so far. Plus, they don't know the extent of the damage so far. They can't say if personal data or credit cards have been stolen. This is bad."
He added that compounding the problem is the number of kids and teenagers who use the PlayStation Network. Parents aren't going to be happy that their children's information, as well as their own data and possibly even their credit card information, has been breached.
"This incident is a huge blow to the trust between customers and Sony," he noted. "If hackers have accessed personal info and credit card data, it could cripple Sony's online gaming business. And it could have a very negative impact on their video game console business overall. If enough users perceive that Sony's network can't be trusted, they'll flee."
That, he added, could hurt Sony's entire gaming platform.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
- NSA used 'European bazaar' to spy on EU citizens
- Target CIO resigns following breach
- Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out
- Sears finds no evidence of data breach -- yet
- Gameover malware is tougher to kill with new rootkit component
- Mobile app for RSA Conference exposes personal data
- UK man charged with hacking Federal Reserve
- Bloomberg clamps down with data-access policies after scandal
- Amazon.com security slip allowed unlimited password guesses on mobile apps
- Huge turnout at RSA shows hackers are winning
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts