01-06-15 02:49 PM
98 1234
tools
  1. Bold_until_Hybrid_Comes's Avatar
    I fired up my bb5 phone last week. Actually got a second SIM for it. What it is able to do, it does well.
    john_v likes this.
    12-31-14 02:55 PM
  2. theRock1975's Avatar
    I would drop my dataplan in a heartbeat if BIS was still available for $5. Email and BBM is all I need.
    john_v and Andy_bb_king like this.
    12-31-14 03:07 PM
  3. ponpiri's Avatar
    Sigh. They can't report about BlackBerry without the snark. This is a neat story, though.
    bungaboy likes this.
    12-31-14 03:58 PM
  4. bungaboy's Avatar
    12-31-14 04:36 PM
  5. belfastdispatcher's Avatar
    Reading the article again there's no mention of BES, my guess is they're just on BIS, there's no way they would've unknowingly pay BES fees for years without using the devices.
    MarsupilamiX likes this.
    12-31-14 04:36 PM
  6. CecilTsunami's Avatar
    Just this morning I was having a giggle because 2015 is the future date in the Back To The Future movies, and they do most of their communication in that future by fax. But now, for Sony, that future I was giggling about might be their most secure reality.

    How did they know?

    Posted via CB10
    12-31-14 04:52 PM
  7. john_v's Avatar
    Just this morning I was having a giggle because 2015 is the future date in the Back To The Future movies, and they do most of their communication in that future by fax. But now, for Sony, that future I was giggling about might be their most secure reality.

    How did they know?

    Posted via CB10
    It also said the Cubs would win the World Series in 2015....
    12-31-14 04:56 PM
  8. bungaboy's Avatar
    A surprising winner emerges from the Sony hack: BlackBerry


    "There aren’t many winners in the Sony hack but one of them might be BlackBerry. The New York Times reports that once Sony realized the massive scope of the hack, it was forced to dig up “a handful of old BlackBerrys, located in a storage room in the Thalberg basement” and give them to key executives. The reason Sony did this is because BlackBerry still has an unmatched reputation for security and their devices were the only way Sony could be sure their high-level executives’ communications remained confidential."

    Sony hack: BlackBerry devices used in wake of hack | BGR
    ibpluto, nhanken and gfondeur like this.
    12-31-14 06:14 PM
  9. Troy Tiscareno's Avatar
    No, it was in part a mobile issue. A massive number of emails were stolen. These are now being publicly released and with attached documents. Mobile communications have basically ceased at Sony and will likely remain so for weeks to months. The loss of the emails was considered so damaging that the head of Sony has order employees not to read them. He fears that there released will impair the ability of people to work cohesively together. This was a mobile disaster.
    The email breech had exactly ZERO to do with mobile. The hackers got into the corporate email servers via the Internet, and they could have done exactly the same thing even if Sony had no mobile devices at all. It wasn't a mobile hack, and only affected mobile to the extend that mobile devices normally had access to the corporate email servers.

    You can try to twist it all you like, but the exact same thing would have happened had Sony been using BB10 phones and BES to manage them, because the attack had NOTHING to do with mobile.
    MarsupilamiX likes this.
    12-31-14 07:40 PM
  10. qbnkelt's Avatar
    This is an interesting overview.
    http://www.wsj.com/articles/behind-t...ded-1419985719


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    MarsupilamiX likes this.
    01-01-15 04:41 AM
  11. Joe Clean's Avatar
    "Temporarily"...
    So what exactly they were using back then during the attack?
    01-01-15 04:47 AM
  12. Joe Clean's Avatar
    This is an interesting overview.
    Behind the Scenes at Sony as Hacking Crisis Unfolded - WSJ

    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    The article is blocked, could you please tell us what it is about?

    PS: you really like the iPhone 6 huh?
    01-01-15 04:56 AM
  13. qbnkelt's Avatar
    http://gizmodo.com/why-sony-keeps-ge...ked-1667259233


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 04:57 AM
  14. belfastdispatcher's Avatar
    Yes, can you copy and paste the text, I can't read it either
    01-01-15 04:58 AM
  15. qbnkelt's Avatar
    The article is blocked, could you please tell us what it is about?

    PS: you really like the iPhone 6 huh?
    Oh no!!! It had a really interesting overview. I just posted another. I hope that one works!


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 04:59 AM
  16. qbnkelt's Avatar
    573 588
    MEDIA & MARKETING
    Behind the Scenes at Sony as Hacking Crisis Unfolded
    Studio Chief Michael Lynton Talks About the Realization of Extent of Damage
    Sony Pictures CEO speaks exclusively to the WSJ about the cyberhack and and its aftermath. WSJ Film Industry reporter Ben Fritz reports. Photo: Getty
    By BEN FRITZ, DANNY YADRON and ERICH SCHWARTZEL
    Dec. 30, 2014 7:28 p.m. ET
    51 COMMENTS
    The day after Sony Pictures employees discovered that company email was unusable following a cyberattack, senior executives came up with an old-style communication network: a phone tree, in which updates on the hack were relayed from person to person.

    With computers and landline phones down during Thanksgiving week, the Sony Corp. studios 6,000 employees were forced to improvise, with cellphones, Gmail accounts and notepads. The payroll department dug up an old machine to cut paychecks manually. Before long, the studio unearthed a cache of BlackBerrys, which still worked because they send and receive email via their own servers.

    Advertisement

    Sony Entertainment Chief Executive Michael Lynton told a meeting of senior executives that hackers hadnt simply stolen data. They had erased it, rendering the entire computer system unusable.

    It took me 24 or 36 hours to fully understand this was not something we were going to be able to recover from in the next week or two, Mr. Lynton recalled in an interview.

    Advertisement

    The next several weeks would make clear that Sonys film and television studio was the victim of one of the most malicious cyberattacks in historyone that would result in the leak of hundreds of thousands of sensitive documents and embarrassing emails, the worsening of tensions between the U.S. and North Korea, a flip-flop on the release of a politically sensitive movie and damage to the companys relationships with stars and theater owners.

    RELATED

    White House Deflects Doubts on Sony Hack
    The cascade of crises threw a spotlight onto the analytical and reserved Mr. Lynton, who has long had a lower profile in Hollywood than his top deputy, motion picture chief Amy Pascal, who works out of a larger office suite than he. Mr. Lynton, a 54-year-old former publishing, movie and Internet executive, has run Sony Pictures since 2004 but was known as a largely hands-off manager until the past month.

    While the studio has been closed for the holidays, Mr. Lynton has been personally pursuing deals for wider distribution of The Interview in theaters and online, negotiations that normally fall to executives several levels beneath him. I have tried to make sure all the decision-making related to this incident comes back to me so that, as much as possible, the operating groups are not distracted from the normal business they have to do, he said.

    Over Thanksgiving weekend, the IT department scrambled to get basic systems like email back online. Agents from the Federal Bureau of Investigation worked nearby, as did investigators from FireEye Inc., a cybersecurity company that deploys Ghostbusters-like teams to companies that have been hacked.

    Kevin Mandia, FireEyes chief operating officer, called the confluence of stolen credentials, erased hard drives, and leaked documents at Sony unprecedented in the history of corporate cyberhacks.

    Though the hackers ordered Sony in their initial message to obey us, they never identified themselves or issued specific demands. Instead, they created maximum chaos. The week after the hack, the perpetrators leaked five Sony movies onto the Internet, along with thousands of internal documents and the Social Security numbers and other personal information of more than 47,000 people, including current and former employees, freelancers and a handful of movie stars.

    FireEyes investigators searched for clues on who had broken into the systems and when. But so much data had been destroyed that they have had trouble retracing the hackers steps. They still cant confirm that the hackers have been eradicated from Sonys systems, two people familiar with the investigation said.

    Within a week, investigators had begun to suspect that North Korea had a hand in the breach, based on some hints in the attack code. And at one point, the malware appeared to ping one of the few Internet addresses linked to North Korea, investigators said.

    North Korea has denied responsibility for the attack, but it hasnt minced words in its anger over a movie that Sony was producing: The Interview, a lewd comedy about an attempt to assassinate North Korean leader Kim Jong Un.

    During the movies production, Sony executives had consulted with government officials and experts at think tanks to discuss the films possible political implications, and made tweaks such as using the Columbia Pictures label instead of the Sony name. But Sony executives said they never considered the potential for direct retribution.

    People involved in the investigation say North Korea remains the leading suspect. While a theory has been floated attributing the hack to an unknown disgruntled former employee, the FBI on Tuesday said there is no credible information to indicate that any other individual is responsible for this cyber incident.

    Sony Corp. has been hacked before, so questions have been raised about its defenses. In 2011, hackers stole personal-account data for more than 100 million users of Sonys PlayStation game system, a public-relations disaster. In the following years, Sony Corp. increased staff at its 24-hour security operations center near Washington, D.C., that worked for all of its U.S. units, as well as directly at the studio, according to former employees. Sony Pictures employed 42 firewallsspecialized computers designed to keep out hackers.

    In the fall of 2013, Sony switched monitoring of its cybersecurity equipment from an outside company to an in-house team, according to an audit report from September 2014 included in leaked emails. It appeared that monitoring of one firewall and 148 other pieces of computer gear was lost in the shuffle.

    It isnt known if any of those lapses played a role in the breach, but the audit report had said, Security incidents impacting these network or infrastructure devices may not be detected or resolved [in a timely fashion].

    By Dec. 16, Sonys isolation increased even further when, along with a trove of Mr. Lyntons emails, the hackers posted a message threatening violence against any theaters that showed The Interview, scheduled to open on Dec. 25, warning readers to Remember the 11th of September 2001.

    The Department of Homeland Security said there was no credible evidence of an active plot against movie theaters, but cinema operators and even executives at other studios with movies opening around Christmas began urging Sony to cancel the films release, fearing the public would stay away from multiplexes. Sony resisted, and told the theaters it was their calla move that angered cinema chains.

    On Wednesday, Dec. 17, movie chains including Regal Entertainment Group , AMC Entertainment Holdings Inc. and Cinemark Holdings Inc. joined an industry conference call and indicated they wouldnt screen the picture.

    Hours later, Sony canceled the Dec. 25 release altogether, prompting criticism that it was giving in to terrorismexactly the reaction it had been trying all along to avoid. By Dec. 19, President Obama joined the chorus, saying Sony had made a mistake.

    Even as Mr. Lynton defended the cancellation on CNN, the company was hunting for cable or digital companies willing to release the film online. Most were reluctant, but by the next week Google Inc. and Microsoft Corp. were on board, along with more than 300 independent theatersenough to put together a piecemeal release simultaneously on big and small screens.

    With more than $18 million in digital and box-office revenue so far, The Interview, which had a $44 million budget, isnt a total write-off for Sony and its release would appear to put to rest the biggest question since the hack started: Whether the film would be seen by the public in any form.

    If the companys systems stay secure, Sony Pictures network is expected to be fully operating again within eight weeks. Further disclosures of emails and confidential documents may just be part of life for the studio, however: The hackers so far have released only a minuscule fraction of the 100 terabytes of data they claim to have stolen.

    Mr. Lynton must still massage relations with partners worried about security when doing business with Sony and creative types who now have more insight than the company might like into how senior executives talk in private about them and their work.

    Relations with exhibitors remain particularly tense. Only one cinema CEO contacted Mr. Lynton directly to say he wouldnt play The Interview. Mr. Lynton ended up calling the heads of major chains personally to try to smooth things over after saying on CNN that theaters were to blame for the movie not being released.

    The discussions were cordial, according to a person with knowledge of the calls, but one exhibition executive said the industry still holds a grudge against Sony for its handling of the matter.

    Mr. Lynton said that amid the chaos and conflicting demands of the past month, his top priority was to make important decisions quickly: You cant be caught in the headlights doing nothing.

    573 588


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 05:05 AM
  17. belfastdispatcher's Avatar
    http://gizmodo.com/why-sony-keeps-ge...ked-1667259233


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    Hmmm, I didn't know about the Sony DRM scandal, u don't think I'll ever buy any of their products.

    Do as I say don't do as I do seems to be their motto
    01-01-15 05:12 AM
  18. qbnkelt's Avatar
    "Temporarily"...
    So what exactly they were using back then during the attack?
    I'm looking for what they were using during the attack but I can't find anything that mentions mobile. It's all related to apparent security breaches due to improper infrastructure.

    I'm still looking.. Give me a sec. Or you could search too, I'm just literally asking "how Sony got hacked" to see if anyone's got the actual method used for the hack.

    According to what I'm finding the entire mail system came under attack which is why they went around and used the NOC. There is no mention of there having been BES though. But even then, the breach was to the email server which would have been affected no matter what MDM was used.

    What they've done is found a way to circumvent that through the NOC.


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    Joe Clean likes this.
    01-01-15 05:14 AM
  19. qbnkelt's Avatar
    Hmmm, I didn't know about the Sony DRM scandal, u don't think I'll ever buy any of their products.

    Do as I say don't do as I do seems to be their motto
    There is a lot of anger against them and they have very poor network security, if these articles are to be believed.

    This is still a developing story but it's already showing a lot of history.

    Never had a Playstation but of course I remember the whole brouhaha around it.


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 05:18 AM
  20. qbnkelt's Avatar
    http://mobile.nytimes.com/2014/12/31...html?referrer=



    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 05:27 AM
  21. qbnkelt's Avatar
    Seems Sony had a habit of storing unencrypted password and account information.
    http://www.wired.com/2014/12/sony-hack-part-deux/



    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    01-01-15 05:36 AM
  22. qbnkelt's Avatar
    Still can't find any mention of mobile device implications but this article refers to social engineering such as spear phishing.

    http://resources.infosecinstitute.co...h-data-breach/


    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6
    Joe Clean likes this.
    01-01-15 06:05 AM
  23. nhanken's Avatar
    Goes to show they never cared about security in the first place. It just takes one really stupid move to lose the game when you have fierce competitors eyeing you 24/7. Public perception...

    Seems Sony had a habit of storing unencrypted password and account information.
    http://www.wired.com/2014/12/sony-hack-part-deux/



    Sent from my SEXY GORGEOUS AWESOME GOLD 128G iPhone 6


    Once you go black, you can't turn back! Posted via CB10
    01-01-15 08:35 AM
  24. Dajavine's Avatar
    You got the key point. It is not about how Sony got hacked. When they need a mobile solution for emergency, they chose BlackBerry. They didn't choose other phones with cloud services.
    01-01-15 10:43 AM
  25. qbnkelt's Avatar
    You got the key point. It is not about how Sony got hacked. When they need a mobile solution for emergency, they chose BlackBerry. They didn't choose other phones with cloud services.
    Actually, there is discussion here as to how it was hacked, with some folks saying it was a mobile issue and some folks saying that it wasn't.
    So I'm looking for anything that points to what they were using and how that played into the hack.
    From the articles, they are using BlackBerry because there was a cache of old devices in storage. It was, in a crisis, what was available.
    If anyone can find that there was in fact a mobile component to the attack rather than lacking security practices and social engineering by way of spear phishing, I'd be very interested in reading that. It would be something that I can use at my work.

    Sent from my Q10 using Tapatalk
    mornhavon and MarsupilamiX like this.
    01-01-15 10:50 AM
98 1234

Similar Threads

  1. Verizon Store Reps need some Blackberry education
    By smithm565 in forum Verizon Wireless
    Replies: 35
    Last Post: 01-12-15, 12:11 PM
  2. Replies: 1
    Last Post: 12-31-14, 12:26 AM
  3. BlackBerry Music Gateway not pairing with Passport
    By sevied in forum BlackBerry Passport
    Replies: 3
    Last Post: 12-30-14, 08:57 PM
  4. Blackberry officially done with Flash!
    By spadabear in forum BlackBerry 10 OS
    Replies: 1
    Last Post: 12-30-14, 08:43 PM
LINK TO POST COPIED TO CLIPBOARD