{"id":14673,"date":"2014-12-18T12:21:30","date_gmt":"2014-12-18T18:21:30","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=14673"},"modified":"2014-12-19T12:34:48","modified_gmt":"2014-12-19T18:34:48","slug":"sony-hackers-completely-owned-this-company","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=14673","title":{"rendered":"Sony Hackers &#8216;Completely Owned This Company&#8217;"},"content":{"rendered":"<blockquote><p>&#8220;It&#8217;s really a phenomenally awesome hack\u2014they completely owned this company,&#8221; Schneier, who is <a href=\"https:\/\/www.schneier.com\/about.html\">regularly consulted by the federal government on security issues<\/a>, said. &#8220;But, I think this is just a regular hack. All the talk, it&#8217;s hyperbole and a joke. They&#8217;re [threatening violence] because it&#8217;s fun for them\u2014why the hell not? They&#8217;re doing it because they actually hit Sony, because they&#8217;re acting like they&#8217;re 12, they&#8217;re doing it for the lulz, no one knows why.&#8221;<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/motherboard.vice.com\/read\/bruce-schneier-sony-hackers-completely-owned-this-company?trk_source=popular\">Bruce Schneier: Sony Hackers &#8216;Completely Owned This Company&#8217; | Motherboard<\/a>.<\/p>\n<p>Unless you know how infiltrators got into Sony&#8217;s system there is no way figuring out the who behind the hack.\u00a0 So far details of this has been lacking and as far as potential culprits targeting Sony, North Korea is probably least capable from an education standpoint and logistics.\u00a0 Social engineering, getting people inside Sony to cooperate is usually behind successful infiltrations.\u00a0 Sony&#8217;s Playstation network was taken down awhile ago.\u00a0 I suspect whoever did that probably is behind this despite what movie is about to be released soon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It&#8217;s really a phenomenally awesome hack\u2014they completely owned this company,&#8221; Schneier, who is regularly consulted by the federal government on security issues, said. &#8220;But, I think this is just a regular hack. All the talk, it&#8217;s hyperbole and a joke. &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=14673\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1121],"tags":[733,718,102,528],"class_list":["post-14673","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-cyberwar","tag-data-security","tag-hacking","tag-sony"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14673"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14673\/revisions"}],"predecessor-version":[{"id":14675,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/14673\/revisions\/14675"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14673"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}