The Sony Pictures Entertainment hack, and the company's decision to yank the release of a film in the wake of hackers' threats, has provoked intense reactions. Read the comments and join the conversation.
The White House says that it's treating the hack attack against Sony Pictures Entertainment as a "national security matter." But it says it's too early in its investigation to definitively attribute the attacks to any particular group or nation.
Many security experts say Sony Pictures Entertainment's decision to cancel the release of the film "The Interview" following a "terror" threat made by hackers against movie theaters and theatergoers sets a dangerous precedent.
Don't take at face value the report that the U.S. government believes that North Korea hacked Sony Pictures Entertainment, numerous information security experts say, warning that hacktivists, insiders or other nations could be the culprits.
Hackers issued a "terror" threat against movie theaters that show the forthcoming Sony comedy "The Interview," but the U.S. Department of Homeland Security sees "no credible intelligence to indicate an active plot."
A breach notification letter sent by Sony Pictures Entertainment to its employees offers a conclusive look at the amount of personal information, including healthcare data, taken by hackers following a Nov. 24 "wiper" malware attack.
Three weeks after attackers launched a wiper malware attack against Sony Pictures Entertainment and began leaking stolen data, Sony has threatened legal action against media outlets that publish related information.
A report claiming that Las Vegas Sands Corp. was hit with a "wiper" malware attack back in February, similar to one that recently affected Sony Pictures Entertainment, illustrates why more organizations need to mitigate the risks of such an attack.
A new version of the Destover malware includes a legitimate certificate from Sony. But a researcher claims it's a hoax. Meanwhile, new evidence emerges that the hackers who attacked Sony Pictures Entertainment had criminal - not nation-state - intentions.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
The hacking gang Lizard Squad has claimed credit for knocking Sony's PlayStation Network offline. Meanwhile, investigators continue to suspect North Korea may have launched the recent, "unprecedented" hack of Sony Pictures Entertainment.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.