While Sony is still in hot water, the CIA published it’s report about techniques used during interrogation. Could there be a retaliation against the CIA and government agencies? And what has Sony taught us about our vulnerabilities?
“You don’t store passwords in Word files or in Excel spreadsheets.” — infoRiskToday, Dec. 9, 2014
“I expect there to be some sort of retribution” — Computerworld, Dec. 10, 2014
“Based on FBI alerts related to the Sony attack, furthermore, the attackers had access ports associated with Active Directory, NetBIOS and remote-desktop control” — BankInfoSecurity, Dec. 10, 2014
“There capabilities are just not that great … Of the attacks we know, almost all were denial-of-service attacks.” — Computerworld, Dec. 11, 2014
“I highly doubt Sony is doing this … And I highly doubt this would work. As for the legality, [it’s] probably highly illegal.” –infoRiskToday