While Sony is still in hot water, the CIA published it’s report about techniques used during interrogation. Could there be a retaliation against the CIA and government agencies? And what has Sony taught us about our vulnerabilities?

“You don’t store passwords in Word files or in Excel spreadsheets.” — infoRiskToday, Dec. 9, 2014

“I expect there to be some sort of retribution” Computerworld, Dec. 10, 2014

“Based on FBI alerts related to the Sony attack, furthermore, the attackers had access ports associated with Active Directory, NetBIOS and remote-desktop control” BankInfoSecurity, Dec. 10, 2014

“There capabilities are just not that great … Of the attacks we know, almost all were denial-of-service attacks.” Computerworld, Dec. 11, 2014

“I highly doubt Sony is doing this … And I highly doubt this would work. As for the legality, [it’s] probably highly illegal.” infoRiskToday