ALL >> Computers >> View Article
Cybercriminals Target Sony Ericsson Canada, Steal Confidential Information
In yet another security breach incident, cybercriminals intruded the servers of Sony Ericsson Canada. Attackers were allegedly successful in extracting names, e-mail addresses, and encrypted passwords of around 2000 customers from the website of Sony Ericsson Canada. Information security professionals have temporarily disabled the website, and are investigating the incident. Preliminary investigations have not revealed theft of credit card information. The security breach at Sony Ericsson is the new addition to a fresh series of security incidents on Sony corporations. The latest attack follows security incidents at Sony BMG Greece, So-net Japan, and reported live phishing site on the company's Thailand server. The breach at Sony BMG Greece, resulted in exposure of information related to around 8,500 individuals. Cybercriminals were successful in stealing funds worth 100,000 yen by breaching the security of So-net, the Japanese subsidiary of Sony. Last month, security breach at Sony's PlayStation Network and Sony Online Entertainment resulted in unauthorized access to personally identifiable information related to over 100 million ...
... customer accounts.
Frequent data breach incidents not only attract negative publicity, but also results in loss of customer trust and confidence. Confidentiality and security of customer databases is crucial for undisrupted business operations of a company. Unauthorized access to personally identifiable information may have privacy and financial implications for the affected individuals. Intruders may use the extracted information for identity theft, conducting unauthorized transactions, opening fraudulent accounts, applying for fraudulent credit card and loan accounts.
Affected individuals must immediately seek credit bureaus to issue a fraud alert on their accounts. They must regularly scrutinize their bank and credit card statements and reported suspicious or unauthorized transactions to their respective bank and credit institutions.
Hiring professionals qualified in masters of security science may help organizations in understanding the security scenario, identifying threat vectors and creating a robust IT security policy to safeguard IT infrastructure from security breaches. Regular vulnerability assessment and penetration tests could help in identifying weaknesses and vulnerabilities and initiating mitigating measures. Organizations must have proper patch management policy in place for timely identification and application of requisite security patches and updates. Employees must be encouraged to undertake online degree and e-learning programs to understand various types of social engineering threats and cyber security tips.
Government and industry associations must encourage students to undertake online university degree courses and IT security certifications to meet the future demand for cyber security specialists and strengthen defenses of critical infrastructure facilities and business organizations from vibrant cyber threats.
Add Comment
Computers Articles
1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech GazebosAuthor: Tech Gazebos
2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk
3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller
4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp
5. Spark Matrix™: Ai Observability Solutions
Author: Umangp
6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT
7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10
8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware
9. Buy Epson Thermal Printer: What To Know
Author: pbs
10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware
11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin
12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy
13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies
14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway
15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities






