WebProNews

Tag: Hacked

  • Dropbox: We Were Not Hacked

    Dropbox: We Were Not Hacked

    According to reports, hundreds of Dropbox usernames and passwords were leaked online as a preview to a larger alleged leak of 7 million accounts.

    As The Next Web reports, a thread appeared on reddit pointing to files with the leaked account details, saying, “Here is another batch of Hacked Dropbox accounts from the massive hack of 7,000,000 accounts. To see plenty more, just search on [redacted] for the term Dropbox hack. More to come, keep showing your support.”

    According to Dropbox, it hasn’t been hacked, and any such account details have been obtained from third-party services. The company addressed the situation on its blog, saying that it wasn’t hacked:

    Recent news articles claiming that Dropbox was hacked aren’t true. Your stuff is safe. The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the internet, including Dropbox. We have measures in place to detect suspicious login activity and we automatically reset passwords when it happens.

    Attacks like these are one of the reasons why we strongly encourage users not to reuse passwords across services. For an added layer of security, we always recommend enabling 2 step verification on your account.

    In a update to the post, it added:

    A subsequent list of usernames and passwords has been posted online. We’ve checked and these are not associated with Dropbox accounts.

    Long story short, it’s probably a good time to reset your passwords across the various online services you use, and to make them all different this time.

    Image via Dropbox

  • Skype Blog Hacked To Tell People Not To Use Microsoft Email

    Microsoft’s Skype had its Twitter account, Facebook page and blog compromised on Wednesday, with the Syrian Electronic Army taking control of all three to spread its anti-spying/anti-Microsoft email message.

    Back in the summer, leaked slides from the NSA came out indicating that the government agency could wiretap Skype video calls thanks to a “backdoor” in the popular service. The Guardian reported at the time:

    The NSA has devoted substantial efforts in the last two years to work with Microsoft to ensure increased access to Skype, which has an estimated 663 million global users.

    One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.

    Skype had reportedly been part of the Prism program since February 2011, eight months before Microsoft acquired the company.

    When the Syrian Electronic Army took over Skype’s Twitter account, the message was: Stop spying on people! via Syrian Electronic Army @Official_SEA16 #SEA cc @FBIPressOffice spr.ly/6019di9c.” The link pointed to the Skype blog, which said, “Hacked by Syrian Electronic Army.. Stop Spying!” and “Don’t use Microsoft emails (hotmail, outlook), They are monitoring your accounts and selling the data to the governments.”

    The message was still available in RSS readers like Feedly this morning:

    Skype blog hacked

    A similar message appeared on Skype’s Facebook page.

    Skype got control of its properties back, and posted the following to Twitter last night:

    As of the time of this writing, the Skype blog is inaccessible, simply redirecting to Skype’s homepage.

    The first line in Skype’s privacy policy says, “Skype is committed to respecting your privacy and the confidentiality of your personal data, traffic data and communications content.”

    Microsoft has run ad campaigns for its Outlook.com service (formerly Hotmail), slamming the privacy practices of competitor Google, implying that its own are superior.

    Image: Feedly

  • Target Discount Offered After Major Security Breach

    Target Discount Offered After Major Security Breach

    After that big breach – the theft of credit and debit card data from more than 40 million of its customers,Target is scrambling to find a way to keep its customers coming back.

    Hackers obtained the credit and debit card numbers of millions of Target customers over the course of 19 days, beginning the day before Thanksgiving, according to Reuters. If you are wondering whether your information has been compromised, the retailer says to call 866-852-8680.

    Target CEO Gregg Steinhafel issued an apology on the company’s website Friday to the 40 million, more or less, customers affected by one of the largest credit-card breaches ever to hit a U.S. retailer. His apology went like this:

    “We take this crime seriously. It was a crime against Target, our team members, and most importantly, our guests. We’re in this together, and in that spirit, we are extending a 10% discount – the same amount our team members receive – to guests who shop in U.S. stores on Dec. 21 and 22. Again, we recognize this issue has been confusing and disruptive during an already busy holiday season. We want to emphasize that the issue has been addressed and let guests know they can shop with confidence at their local Target stores.”

    In yet another statement – Steinhafal made many he apologized, acknowledging that consumers trying to get information from the retailer’s website or telephone hotline were having trouble getting through.

    On the company’s Facebook page, people made their frustrations known. “As long as I’m on hold, I’ll promote Walmart,” one person wrote.

    Steinhafel tried to reassure customers that the company would offer not only discounts but also credit monitoring for all affected.

    So, not only have customers undoubtedly lost credit and debit card information to the cyber thieves, they cannot seem to get through to the company via their website or the phones – imagine 40 million people freaking out all at once. Could clog up some phone and internet lines.

    At least the CEO is showing concern for something he had no power to prevent. And credit goes out from experts to Target for catching this problem extremely early.

    Image via YouTube

  • Miss Teen USA Victim of Cyber-Crime

    Miss Teen USA Victim of Cyber-Crime

    What would you do if someone sent you an e-mail threatening to release pictures that they stole, off of your computer, to the media if you didn’t cooperate and send them nude pictures of yourself? Would you go to the authorities, or simply send them the pictures that they asked for?

    19-year-old Cassidy Wolf was forced to make this decision, when someone hacked into her webcam and claimed that they had nude photographs of her. The hacker told Wolf if she didn’t send more nude pictures then he would make the them public for all to see. Wolf didn’t take any chances, and went straight to the police with the “sextortion” threat. According to collinsdictionary.com, “sextortion” is defined as, “a form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort sexual favors from the victim.”

    “I wasn’t aware that somebody was watching me on my webcam,” Wolf said. “The light on the camera didn’t even go on, so I had no idea.”

    FBI spokeswoman, Laura Eimiller said, “Many victims are embarrassed or keep it to themselves. Coming forward is key to stopping the criminal activity.” There is currently a federal investigation into the crime and it is believed that they may have a suspect. No further information, into the investigation, has been released.

    Wolf was crowned Miss Teen USA on Saturday in the Bahamas. She will reign for one-year and hopes that during this year she can raise awareness of the increasing number of cyber-crimes that are targeting young women. “This next year I’m just so excited to be able to share my story and raise awareness in young teens about what can happen,” she said.

    http://youtu.be/YUf2KXKIu8w

  • Chipotle’s Twitter Account Hacked By Someone Looking For Avocados

    In the wake of all of these hacked Twitter accounts, it’s hard not to wonder what kind of weak passwords these social media managers are using. It’s really not that hard to create a string of characters others won’t be able to figure out. It really isn’t. If, however, you just can’t get the hang of creating a solid password that can stand up to non-brute force attacks, just follow XKCD’s advice. Anyway, our latest figure to fall victim to losing control of their Twitter account is the Chipotle restaurant.

    The hack happened about six hours ago, and while it didn’t reach Burger King levels, some fun was had by at least one person. Judging by the tweets in question, which have been preserved via a screenshot, it wouldn’t be surprising if some mind-altering chemicals were involved:

    Chipotle Twitter Hack

    Again, pretty innocuous stuff, and as of this writing, Chipotle has regained control of their Twitter account:


    It should be noted, however, the offending tweets are still up if you really want to see them. Who knows? Maybe the marketing manager for Chipotle’s online presence is leaving them up there as a badge of social media survival. The question remains, however, how does something like this happen? If the hack tweet stream is to be believed, the password in question was Mittens13, and while that may be fine for Aunt Sophie, it’s nowhere near strong enough for a corporation looking to protect their brand. If it’s a disgruntled employee looking to damage the brand, that’s one thing, but judging by the tweets in question, that’s doesn’t appear to be the case.

    Instead, it looks like a case of someone stumbling onto something unexpected, and then goofing around with their newfound toy. Use stronger passwords, people.

    (H/t to Geekosystem for pointing this out)

  • LinkedIn Blog Attacked by Syrian Hackers

    [UPDATE] The blog is back up.

    [ORIGINAL]
    On the same day that LinkedIn has launched its new iPad app, the announcement of the app on the LinkedIn blog is unavailable. In fact, the entire blog is unavailable due to an attack on the site.

    The Next Web (TNW) is reporting that the blog has apparently been hacked by a group calling themselves the Syrian Electronic Army (SEA). TNW points to a Twitter account that reports SEA hacking:

    #SEA #Syria #RealSyria
    @Linkedin Blog http://t.co/xLrhQjA8 Get Hacked By Syrian Electronic Army | http://t.co/P3NsHQZz | @YourAnonNews 18 hours ago via web ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    A mirrored link to the blog shows what became of the site. An image of Syrian President Bashar al-Assad in front of the Syrian flag took the place of the blog.

    The LinkedIn blog, hacked

    The image was followed by a message from the hackers, excoriating the Syrian National Council as a front of the Muslim Brotherhood:

    “We are a group of Syrian youth who wanted to show the truth and therefore we used this website which was used to spread lies about Syria. We are the Syrian Electronic Army and we come in pekoe for those who want peace for Syria.” [sic]

    It is unclear why LinkedIn was the target of this attack. The manifesto graffiti left on the site doesn’t mention LinkedIn by name at all. The company takes no stance on Syrian politics. The only assumption that can be made at this point is that LinkedIn was targeted because of the iPad announcement. The SEA co-opted the announcement to get their message out. It appears to be an example of the recent rise in “hacktivist” attacks.

    Let’s hope LinkedIn, who was obviously innocent, can get their blog back in shape soon. I hear that new iPad app is a good one.

    (via The Next Web)

  • Gaming News Site ‘Gamasutra’ Hacked?

    Go the the Gaming site, Gamasutra and you will get the above warning from Google Chrome. A similar warning will appear on Safari, blocking access to the entire site.

    Gamasutra has Tweeted about the problem and are looking into a solution. They have not commented on the source of the problem, or if the malware threats are real or not. We will update this article as more information becomes available.

    Thanks everyone for bringing the malware warnings to our attention. We are currently looking into the issue. 37 minutes ago via web ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

  • Justin Bieber’s Twitter Account Hacked

    Canadian Pop icon Justin Bieber had his Twitter account hacked into yesterday. The hacker unfollowed people and blocked some of Bieber’s followers. He also posted, “19 million my ass #biebermyballs” for Justin’s 19 million followers.

    The hacker chose to purvey this most heinous crime as Bieber reached 19 million followers yesterday. I guess that was a milestone the hacker couldn’t deal with, as he began blocking followers left and right.

    He also didn’t take too kindly to Bieber following anyone else either, as he unfollowed over 100,000 people Justin was following. Bieber’s people quickly re-followed who they could and restored order to the account and the universe. So far nothing strange has happened again.

    “#biebermyballs” may sound familiar to you. Carly Rae Jepsen’s Twitter account was hacked a few weeks ago, and the same hashtag was used by that hacker as well. No one knows if it is the same hacker, as neither one has been identified yet.

    Beliebers on Twitter have alot to say about the hack. Big surprise, there. It’s amazing how many people have a Twitter account for the sole purpose of watching everything Bieber does.

    Justin getting hacked isn’t funny, but the #biebermyballs part just made me laugh. If that hacker really did unfollow Beliebers. He’s dead. 19 hours ago via web ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    Someone hacked Justin Bieber and wrote #biebermyballs? I need to find this person and they will be my best friend. 19 hours ago via Twitter for iPhone ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    The person that hacked justin must have been the person that hacked carly. Cuz the hacker tweeted #biebermyballs again. 19 hours ago via web ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    Crying at Justin Bieber #biebermyballs 19 hours ago via web ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    #biebermyballs Made my DAY!!! 58 minutes ago via tweetz ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    Apparently the hacker said, “19 million my ass. #biebermyballs” i think its the same lifeless bastard who hacked Carly. 3 hours ago via Samsung Mobile ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    “Lifeless bastard,” really?

  • Security Cameras From TRENDnet Hacked

    Security Cameras From TRENDnet Hacked

    If you have a TRENDnet security camera in your home, listen up. A coding flaw found in some of the cameras allows someone to bypass your password and look into your home.

    Hackers have found a small piece of code attached to the IP address of the camera will bypass the need for a password. Once the discovery was made, addresses of hundreds of cameras were posted online for voyeurs to peek in on.

    TRENDnet responded to the discovery right away with this press release:

    A recent product hack revealed a vulnerability present in several TRENDnet SecurView IP cameras.

    TRENDnet’s security team understands that video from some TRENDnet IP SecurView cameras may be accessed online in real time. Upon awareness of the issue, TRENDnet initiated immediate actions to quantify the scope of the issue, initiate corrective actions, and publish updated firmware which resolves the issue.

    Only select cameras purchased between April of 2010 and the present may be affected and require a firmware update. Eighteen camera models have been identified. A list of the identified products is available on TRENDnet’s homepage: http://www.trendnet.com

    A firmware upgrade was made available and instructions for installing it.

  • Satellite Phones Hacked! – Eavesdropping On James Bond

    Satellite Phones Hacked! – Eavesdropping On James Bond

    Researchers at a university in Germany have used open-source software to crack the encryption key for satellite telephones in about an hour.

    The team bought two readily-available sat phones and downloaded firmware updates for them. The updates revealed the encryption on the sat phones was not much different from regular cell phone GSM encryption, which has been cracked in the past. From there, it did not take much to crack the sat phone encryption.

    In some regions of the world standard cell phone communication is still not available. In war zones, developing countries and on the high seas, satellite phones are used instead. Here, the telephone is connected via radio directly to a satellite. This passes the incoming call to a station on the ground. From there, the call is fed into the public telephone network. So far this method was considered secure.

    Encryption algorithms are implemented to protect the privacy of the user. There is, as yet, no alternative to the current standards. Since users cannot rely on their security against interception, similar to the security of standard cell phones, they will have to wait for the development of new technologies and standards, or make use of other means of communication for confidential calls.

  • pcAnywhere Compromised: Disable Immediately!

    pcAnywhere Compromised: Disable Immediately!

    On January 4, Anonymous tweeted that an Indian hacker group had posted Symantec source code to Pastebin.

    In response to this warning, Symantec has issued a security white paper (pdf) recommending that all users of pcAnyhwere disable the software until further notice.

    “Upon investigation of the claims made by Anonymous regarding source code disclosure, Symantec believes that the disclosure was the result of a theft of source code that occurred in 2006. We believe that source code for the 2006-era versions of the following products was exposed: Norton Antivirus Corporate Edition; Norton Internet Security; Norton SystemWorks (Norton Utilities and Norton GoBack); and pcAnywhere.”

    pcAnywhere is a Norton product that allows for direct PC to PC communication.If the ctolen source code is actually released, the damage to networks that use pcAnywhere could be considerable.

    More detailed information from the white paper:

    Our current analysis shows that all pcAnywhere 12.0, 12.1 and 12.5 customers are at increased risk, as well as customers with prior, unsupported versions of the product. pcAnywhere is also bundled in three Symantec products, Altiris Client Management Suite and Altiris IT Management Suite versions 7.0 or later, and Altiris Deployment Solution with Remote v7.1. In addition, customers with earlier versions of Altiris suites may have opted to leverage pcAnywhere. The increased risk is isolated to the pcAnywhere components only. There are no known impacts to the rest of the components in the Altiris products or the pcAnywhere Solution component that provides integration between pcAnywhere and the Symantec Management Console. Customers should validate the remote control tools currently in use.

    There are also secondary risks associated with this situation. If the malicious user obtains the cryptographic key they have the capability to launch unauthorized remote control sessions. This in turn allows them access to systems and sensitive data. If the cryptographic key itself is using Active Directory credentials, it is also possible for them to perpetrate other malicious activities on the network.

    In an internal pcAnywhere environment, if a network sniffer was in place on a customer’s internal network and the attacker had access to the encryption details, the pcAnywhere traffic could be intercepted and decoded. This implies that a customer either has a malicious insider who planted the network sniffer or has an unknown Botnet operating in their environment. As always, security best practices are encouraged to mitigate this risk.

    Since pcAnywhere exchanges user login credentials, the risk exists that a network sniffer or Botnet could intercept this exchange of information but even then it would be a difficult task to actually interpret the data even if the pcAnywhere source code is actually released. For environments with remote users, this credential exchange introduces an additional level of exposure to external attacks.

  • LulzSec Versus TeaMp0isoN: When Hackers Attack Hackers

    Not everyone in the hacker community smiles upon the shenanigans of LulzSec, the hacker group du-jour of the moment. Seriously, just check out Google News. Right now, LulzSec is a mainstay, and while this publication is adding to it, we concentrate on the web. LulzSec has gained crossover appeal, with stories of their exploits going mainstream.

    Did they get to big for their britches, or did they step on the feet of some “true” hackers, opening the doors for retaliatory strikes from groups who fight the same way? Well, something happened, and as a result, there’s a LulzSec backlash brewing and it’s not just courtesy of the group’s victims. The person and/or group that apparently got rankled by LulzSec belongs to TeaMp0isoN (Team Poison) hacker team. It seems, among other things, that members of TeaMp0isoN didn’t like being associated with LulzSec and began hacking them in return.

    Hackers hacking hackers. Although the story gets a little bit more complicated than that, the previous exercise in alliteration sums up things quite effectively. As for the “why” LulzSec is being targeted, well, that’s where the complication comes in.

    Based on my limited exposure to various hacker groups around, from what I can tell, TeaMp0isoN is one of the more respected groups, one that doesn’t necessarily like being associated with LulzSec, for a number of reasons. Chief, however, is the fact that LulzSec’s activity aren’t looked upon as true hacker exploits. The targets themselves weren’t the problem. The automated methods used to gain control of the targets on the other hand, were. This was made apparent when — and this is where the details get fuzzy — a suspected LulzSec member was hacked by a TeaMp0isoN member, which was discovered by th3j35t3r, another hacktivist who is at odds with LulzSec.

    While the LulzSec member hack has been denied, in combatant fashion, no less, there’s a screenshot of the defacing (click for larger image):

    TeamPoison Hack

    Here’s the transcript, courtesy of I Found The Internet. [sics] remain intact:

    No matter how many bots you gather, no matter how much people you lie to, no matter how much pre-made tools you use, you will _NEVER_ represent the real hacking scene, we warned you, we told you we do not make empty threats, we gave u 48hrs to secure your ircs yet u failed to do so, instead u posted hashes from public forums and then claimed you doxed us and laughed at the fact that i was 17years old. stop telling yourself that u are hackers, putting a ip into a irc is NOT hacking nor is using pre-made tools and scripts to grab databases… you do not represent the anti-sec movement, u are not allowed to greet underground groups like zf0, ab, h0n0, el8 like your member “AnonSabu” was doing, you will never be apart of the underground scene, if anyone thinks you are underground and can actually hack they have no idea about what happens in the underground scene. oh and TeaMp0isoN Issue 2 is coming out VERY soon exposing lulzsec members (pictures, addresses, passwords, ips, phone numbers etc). . . . not so anonymous anymore are you? lets hope that you can swim because the lulzboat just got titanic’d…

    The taunting message was found at the site of Dutch developer Sven Slootweg, who, as indicated, denied his site got hacked in a defiant manner:

    Notice to press: This website was compromised through exploiting a plugin in an outdated WordPress setup, uploading a shell, and replacing the index page. I am not a member of Lulzsec (a statement I have made several times before in various places), noone “hacked the server” (this has been verified by the hosting company, as this website is on shared hosting) and this was definitely not an “elite hack”. I am not available for further comments to press.

    It should be noted, in order to get to Slootweg’s site — awesome name, by the way — a index_defaced.html file appears first, so I’m not sure how valid his denial is.

    Now for the why. Why is TeaMp0isoN going after LulzSec? Is LulzSec getting publicity other, more deserving hacker groups should get, or is this something a little more personal? According to a link on th3j35t3r’s Twitter, which goes to a blog called “LulzSec Exposed,” some of LulzSec inner circle may have courted this fight themselves. The following screenshot has more details:

    Tweets

    Apparently, some LulzSec members called out TeaMp0isoN, and ta-da, we’ve got ourselves a hacker fight; although, with TeaMp0isoN, it goes a little deeper than that. Not only are LulzSec’s (and Anonymous’) methods derided, the ultimate goal is too. Is LulzSec a group of modern-day Robin Hood hackers or are their exploits doing something a little more criminal?

    Unveillance, a recent LulzSec victim, thinks so:

    Over the last two weeks, my company, Unveillance, has been the target of a sophisticated group of hackers now identified as “LulzSec.” During this two week period, I was personally contacted by several members of this group who made threats against me and my company to try to obtain money as well as to force me into revealing sensitive data about my botnet intelligence that would have put many other businesses, government agencies and individuals at risk of massive Distributed Denial of Service (DDoS) attacks.

    Is extortion part of the LulzSec appeal? So far, there hasn’t been much in the way of response from LulzSec, aside from the misguided denial from Slootweg. While their Twitter account is going strong, there’s nothing in the way of this subject being discussed. Was TeaMp0isoN’s message heard loud and clear, and as a result, is LulzSec steering clear, or is there more to come? Perhaps this LulzSec tweet offers a glimpse…

  • Sony Promises Full Return of PlayStation Network by End of Week

    It’s been a long, hard road for Sony and its Playstation Network, but finally, the light at the end of the tunnel might actually become an attainable destination instead of a rumor. That’s right, Sony is once again promising a full return of the PSN after an extended battle with it and other Sony-owned services after being hacked, almost to death, by those who have a different outlook on technological matters than Sony does.

    The battle between the two parties has been covered extensively. The hacks began after Sony went after hacker George Hotz, who publicized the technique he used to take further control over the console he owned — a capability Sony seemed to support when the PS3 was initially released. Once Sony unleashed their legal department on Hotz, not for the hack, mind you, but to censor Hotz, the war between Sony and Hotz’ supporters was on.

    There were many casualties, something a Google search of “sony hacked” reveals quite nicely.

    But now, after weeks of attempting to restore the network that provides the Playstation’s online capabilities, it appears as if the entire network is ready to reveal itself, as indicated by the official Sony PS3 blog. According to the post/release, the restored PSN will available to most of the world, save the Far East, and all the services included with the PSN will be available as well:

    Sony Corporation and Sony Computer Entertainment (SCE) announced today that Sony Network Entertainment International (SNEI, the company) will fully restore all PlayStationNetwork services in the Americas, Europe/PAL territories and Asia, excluding Japan, Hong Kong, and South Korea by the end of this week. The company will also resume Music Unlimited powered by Qriocity for PlayStation3, PSP, VAIO and other PCs. Details for Japan, Hong Kong, and South Korea as well as the remaining services on Qriocity will be announced as they become available.

    What does this mean for PlayStation 3 owners? Fully functional capabilities that the were paid for when the console was acquired, but beyond that, what else? The release indicates additional layers of security were added to the PSN, and considering the verbal reaming Sony took for the previous version, that’s a good thing.

    Of course, the scolding Sony received is surely small potatoes when compared to the potential revenue the company lost during its “our network has been hacked” debacle. Losing 171 million dollars has a way of reducing the impact of other admonishments, one would think. That being said, considering the PSN is free to PlayStation owners, clearly, the money Sony lost isn’t primarily from console owner revenue, although, it’s likely the negative stories scared would-be owners away. No, the large sum of money Sony lost comes from securing the network and atoning for any misdeeds caused by the personal information leaks.

    As for the restoration, Sony promises the following:

    The full restoration of PlayStation Network as well as part of services to become available on Qriocity will include:

  • Full functionality on PlayStation®Store
  • In-game commerce
  • Ability to redeem vouchers and codes
  • Full functionality on Music Unlimited powered by Qriocity for PS3, PSP, VAIO and other PCs
  • Full functionality on Media Go
  • Customers will be able to purchase and download games and video content from the PlayStationStore on PS3 or PSP. In addition, consumers will have full access to Music Unlimited powered by Qriocity through PS3, PSP, VAIO and other PC’s. Service restoration of Video on Demand powered by Qriocity and Music Unlimited powered by Qriocity for a variety of network-enabled Sony devices will be announced later.

    The question is, just how long will the current, updated, secured network will stay secured? Is this a case of consumers getting what they pay for, in this case, nothing? Does Sony truly care about a service they aren’t getting revenue from, ala Xbox Live? Time will certainly provide the answers, because it’s not like Sony’s long list of hacker enemies are going to go away quietly.