SlideShare a Scribd company logo
Whoami |presentation
| appin labs




Hacked by Chio Lee??
 Hacked by Chio Lee??
   Hacked by Chio Lee??
    Hacked by Chio Lee??
     Hacked by Chio Lee??
      Hacked by Chio Lee??
        Hacked by Chio Lee??
| geek.com
Geek.com is one of the oldest technology news websites
around, dating back to 1996 there are multiple infections and
the I frames take visitors to different malicious websites.
| geek.com
| sony
| sony
| sony
| sony
| sony




APRIL   MAY
| sony
Who is responsible?
| sony
How does Sony Fiasco compare to
past data branches?
| sony
Why do people hate Sony?
The “MAKE” magazine has a long article on this. To summarize, Sony has long history of going after
    legitimate innovation, hobbyists, and competition.


Examples:
•   Shipping hidden Windows rootkits on music CDs.
•   Threatening hobbyists for creating software that enables Sony's Aibo robot dog to dance.
•   Shutting down vendors who want to write emulators that would allow playing your old original
    PlayStation 1 CDs on your PC.
•   Suing companies that build systems for bypassing region restrictions
•   Killing Linux support on PS3.
•   Suing makers, hackers, and tinkers such as Geohot.
•   And now: losing your personal info, your credit card number and your bank account details.
| IPL
Indian Premier League
Indian Premier League , IPLT20 Website Defaced by
Tyson_08 and Inferno SQLi Vulnerability in T20 website at http://www.iplt20.com/
THANKYOU

More Related Content

Similar to NewsBytes - May 2011

Game Piracy
Game Piracy Game Piracy
Game Piracy
abhisheksagi
 
Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman Kumar Jha
 
Introduction of OSS In-house Community of Sony
Introduction of OSS In-house Community of SonyIntroduction of OSS In-house Community of Sony
Introduction of OSS In-house Community of Sony
Shane Coughlan
 
Strategic Analysis of Sony
Strategic Analysis of SonyStrategic Analysis of Sony
Strategic Analysis of Sony
FarhaNaaz38
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
Taking over to the Next Generation
Taking over to the Next GenerationTaking over to the Next Generation
Taking over to the Next Generation
LF Events
 
ERP Case Study On Sony Corporation
ERP Case Study On Sony CorporationERP Case Study On Sony Corporation
ERP Case Study On Sony Corporation
Parimal Patel
 
Weaknesses Of Sony Corporation
Weaknesses Of Sony CorporationWeaknesses Of Sony Corporation
Weaknesses Of Sony Corporation
Heather Vargas
 
人類史上の変曲点
人類史上の変曲点人類史上の変曲点
人類史上の変曲点
義高 福井
 
Business models Reengineering in China
Business models Reengineering in ChinaBusiness models Reengineering in China
Business models Reengineering in China
Benjamin Joffe
 
Media Studies Video games Minecraft 12 03 19
Media Studies Video games Minecraft 12 03 19Media Studies Video games Minecraft 12 03 19
Media Studies Video games Minecraft 12 03 19
Yvonne44
 
Innovation Audit Sony
Innovation Audit Sony Innovation Audit Sony
Innovation Audit Sony
SmirithiK
 
iTunes Ecology; a Media Futures case study
iTunes Ecology; a Media Futures case studyiTunes Ecology; a Media Futures case study
iTunes Ecology; a Media Futures case study
digital wellbeing labs
 
OniBits Partners with Polygon Studios
OniBits Partners with Polygon StudiosOniBits Partners with Polygon Studios
OniBits Partners with Polygon Studios
Liz Evans
 
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
Socheath Yem
 
Sony corporation
Sony corporationSony corporation
Sony corporation
Honey605363
 
Sony
SonySony
Sony
SonySony
Widgets, 360s and Androids
Widgets, 360s and AndroidsWidgets, 360s and Androids
Widgets, 360s and Androids
Sales Hub Pro
 

Similar to NewsBytes - May 2011 (20)

Game Piracy
Game Piracy Game Piracy
Game Piracy
 
Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600
 
Introduction of OSS In-house Community of Sony
Introduction of OSS In-house Community of SonyIntroduction of OSS In-house Community of Sony
Introduction of OSS In-house Community of Sony
 
sony
sonysony
sony
 
Strategic Analysis of Sony
Strategic Analysis of SonyStrategic Analysis of Sony
Strategic Analysis of Sony
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Taking over to the Next Generation
Taking over to the Next GenerationTaking over to the Next Generation
Taking over to the Next Generation
 
ERP Case Study On Sony Corporation
ERP Case Study On Sony CorporationERP Case Study On Sony Corporation
ERP Case Study On Sony Corporation
 
Weaknesses Of Sony Corporation
Weaknesses Of Sony CorporationWeaknesses Of Sony Corporation
Weaknesses Of Sony Corporation
 
人類史上の変曲点
人類史上の変曲点人類史上の変曲点
人類史上の変曲点
 
Business models Reengineering in China
Business models Reengineering in ChinaBusiness models Reengineering in China
Business models Reengineering in China
 
Media Studies Video games Minecraft 12 03 19
Media Studies Video games Minecraft 12 03 19Media Studies Video games Minecraft 12 03 19
Media Studies Video games Minecraft 12 03 19
 
Innovation Audit Sony
Innovation Audit Sony Innovation Audit Sony
Innovation Audit Sony
 
iTunes Ecology; a Media Futures case study
iTunes Ecology; a Media Futures case studyiTunes Ecology; a Media Futures case study
iTunes Ecology; a Media Futures case study
 
OniBits Partners with Polygon Studios
OniBits Partners with Polygon StudiosOniBits Partners with Polygon Studios
OniBits Partners with Polygon Studios
 
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
Why apple-no-sony-by-jay-rajasekera-effective executive-feb-2010
 
Sony corporation
Sony corporationSony corporation
Sony corporation
 
Sony
SonySony
Sony
 
Sony
SonySony
Sony
 
Widgets, 360s and Androids
Widgets, 360s and AndroidsWidgets, 360s and Androids
Widgets, 360s and Androids
 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Metasploit primary
Metasploit primaryMetasploit primary
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
 
Linux for hackers
Linux for hackersLinux for hackers
Android Pentesting
Android PentestingAndroid Pentesting

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

NewsBytes - May 2011

  • 1.
  • 3. | appin labs Hacked by Chio Lee?? Hacked by Chio Lee?? Hacked by Chio Lee?? Hacked by Chio Lee?? Hacked by Chio Lee?? Hacked by Chio Lee?? Hacked by Chio Lee??
  • 4. | geek.com Geek.com is one of the oldest technology news websites around, dating back to 1996 there are multiple infections and the I frames take visitors to different malicious websites.
  • 5.
  • 12. | sony Who is responsible?
  • 13. | sony How does Sony Fiasco compare to past data branches?
  • 14. | sony Why do people hate Sony? The “MAKE” magazine has a long article on this. To summarize, Sony has long history of going after legitimate innovation, hobbyists, and competition. Examples: • Shipping hidden Windows rootkits on music CDs. • Threatening hobbyists for creating software that enables Sony's Aibo robot dog to dance. • Shutting down vendors who want to write emulators that would allow playing your old original PlayStation 1 CDs on your PC. • Suing companies that build systems for bypassing region restrictions • Killing Linux support on PS3. • Suing makers, hackers, and tinkers such as Geohot. • And now: losing your personal info, your credit card number and your bank account details.
  • 15. | IPL Indian Premier League Indian Premier League , IPLT20 Website Defaced by Tyson_08 and Inferno SQLi Vulnerability in T20 website at http://www.iplt20.com/
  • 16.
  • 17.