LulzSec hacks: Time to play the game
Following some notable hacks on Sony and Nintendo, Tom Brewster asks why are gaming firms being targeted?


Outside of updating operating procedures, what can entertainment businesses take away from the Nintendo and Sony hacks? Only one thing get the right protection now.
According to a number of security professionals, Sony just didn't have the right protections in place.
"The most important two threats are data disclosure and downtime as a result of DDoS," Cosoi told IT PRO.
"For the first issue, they should make sure that any data that can leave their premises is encrypted and useless for the attacker. The incident that took place on Friday revealed that Sony had been storing passwords in plain text, which is absolutely unacceptable, especially when the user base exceeds one million entries."
To protect against DDoS attacks in particular, Cosoi recommended considering a re-design of server network architecture, complemented by DDoS protection technologies.
If you're a games company holding gamer data, invest in this kind of security now if you don't have it already. In fact, Cosoi's advice goes for every organisation holding valuable customer data as they are a target.
And if you don't think you're a target at all, you're wrong. Everyone is.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
What is polymorphic malware?
Explainer Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
Anonymous hijacks Russian broadcasts with footage of Ukraine war
News The hacking group said it managed to manipulate the broadcasts of three major Russian state-backed media organisations
-
Anonymous hackers flood ISIS Twitter accounts with gay porn after Orlando shooting
News Hacktivists hijack pro-ISIS Twitter accounts in retaliation for Orlando massacre
-
Anonymous takes down Nissan in dolphin culling protest
News The hacker group launched a DDoS attack on the company's global and Japanese websites
-
Anonymous vs ISIS: Hackers claim ISIS twitter accounts linked to DWP IP addresses
News Hacking group find link between unused UK government IP address and ISIS twitter accounts
-
Anonymous hacks ISIS-affiliated Facebook & Twitter accounts
News Hacking collective declares open season on social media accounts linked to Islamic extremists
-
Anonymous attacks Islamic extremist website over Charlie Hebdo attack
News The hackers took down website ansar-alhaqq.net as part of #OpCharlieHebdo
-
Majority of hidden Tor site requests lead to child abuse images
News A study has uncovered 75 per cent of hidden site traffic points to images of child sexual abuse
-
Anonymous targets Ku Klux Klan Twitter account
News Hacking collective brand white supremacists "terrorists"