123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cybercriminals Target Sony Ericsson Canada, Steal Confidential Information

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In yet another security breach incident, cybercriminals intruded the servers of Sony Ericsson Canada. Attackers were allegedly successful in extracting names, e-mail addresses, and encrypted passwords of around 2000 customers from the website of Sony Ericsson Canada. Information security professionals have temporarily disabled the website, and are investigating the incident. Preliminary investigations have not revealed theft of credit card information. The security breach at Sony Ericsson is the new addition to a fresh series of security incidents on Sony corporations. The latest attack follows security incidents at Sony BMG Greece, So-net Japan, and reported live phishing site on the company's Thailand server. The breach at Sony BMG Greece, resulted in exposure of information related to around 8,500 individuals. Cybercriminals were successful in stealing funds worth 100,000 yen by breaching the security of So-net, the Japanese subsidiary of Sony. Last month, security breach at Sony's PlayStation Network and Sony Online Entertainment resulted in unauthorized access to personally identifiable information related to over 100 million ...
... customer accounts.

Frequent data breach incidents not only attract negative publicity, but also results in loss of customer trust and confidence. Confidentiality and security of customer databases is crucial for undisrupted business operations of a company. Unauthorized access to personally identifiable information may have privacy and financial implications for the affected individuals. Intruders may use the extracted information for identity theft, conducting unauthorized transactions, opening fraudulent accounts, applying for fraudulent credit card and loan accounts.

Affected individuals must immediately seek credit bureaus to issue a fraud alert on their accounts. They must regularly scrutinize their bank and credit card statements and reported suspicious or unauthorized transactions to their respective bank and credit institutions.

Hiring professionals qualified in masters of security science may help organizations in understanding the security scenario, identifying threat vectors and creating a robust IT security policy to safeguard IT infrastructure from security breaches. Regular vulnerability assessment and penetration tests could help in identifying weaknesses and vulnerabilities and initiating mitigating measures. Organizations must have proper patch management policy in place for timely identification and application of requisite security patches and updates. Employees must be encouraged to undertake online degree and e-learning programs to understand various types of social engineering threats and cyber security tips.

Government and industry associations must encourage students to undertake online university degree courses and IT security certifications to meet the future demand for cyber security specialists and strengthen defenses of critical infrastructure facilities and business organizations from vibrant cyber threats.

Total Views: 264Word Count: 411See All articles From Author

Add Comment

Computers Articles

1. How To Design A Website That Keeps Visitors Hooked For Longer
Author: peter

2. Why Australian Businesses Should Collaborate With Local Odoo Partners
Author: Alex Forsyth

3. Web Scraping Api For Zepto Grocery Data In India
Author: FoodDataScraper

4. Spark Matrix™ : Benchmarking Global Leaders In Object-based Storage Solutions
Author: Umangp

5. Leading Epson Printer Dealers In Hyderabad
Author: pbs

6. Will Upgrading To Windows 11 Make Your System Faster?
Author: Smita Jain

7. Scrape Data From Usa Top Grocery Platforms For Retail Intelligence
Author: FoodDataScraper

8. Odoo Manufacturing: How Australian Smes Can Slash Costs Using Odoo 19 Features
Author: Alex Forsyth

9. Top-rated Scholarship Management Software For Universities: Simplifying The Award Process
Author: Brenda Joyce

10. Leveraging Restaurants Menu Details Dataset From Deliveroo Uk
Author: FoodDataScraper

11. Avoid These Costly Mistakes When Hiring An Odoo Implementation Company
Author: Alex Forsyth

12. Grocery Details Dataset From Publix Usa
Author: FoodDataScraper

13. Scrape Luxury Food Trends Data 2025 For Culinary Innovations
Author: FoodDataScrape

14. Selenium With Python Tutorial: Simple Way To Start Automation Testing
Author: Tech Point

15. Top Barcode Scanner Dealers In Andhra Pradesh
Author: prime poskart

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: