In 2011 Sony corporation suffered several major attacks by hackers angered over Sony’s prosecution of people who had illegally modified Sony PlayStations. These attacks exposed several weaknesses in Sony security. The purpose of this article is to address each of these weaknesses in turn and to attempt to suggest the best solution for each.
In recent years, one of the most exciting new ideas in IT has been cloud computing based on Web 2.0 technologies that foster greater user interaction and sharing. For businesses, this often refers to the process in which they make use or one or ...