Sony Introduces Two-Factor Authentication to PlayStation Network

PlayStation and PSP owners can now add an extra layer of security to their accounts by enabling two-factor authentication (2FA), announced the electronics and gaming company on Wednesday.Users who choose to activate the additional security feature will sign in to their accounts using their passwords, as well as a verification code that is sent to their mobile phone via text message.Sony noted that by requiring two forms of identification for sign-in, users’ accounts and personal information will be better protected.2-step verification feature for PlayStation Network accounts launches tonight, offers additional security:— PlayStation (@PlayStation) August 25, 2016“Passwords can be compromised if you use the same password for multiple accounts, click on malicious links, open phishing emails and other methods,” reads Sony’s 2-Step Verification page.“If your password is compromised and becomes known to someone other than yourself, your account will still require a verification code to gain access when you active 2-Step Verification,” said Sony.Although long overdue, the move is welcome, as many users had been requesting the added security measure for years now.In 2011, Sony suffered a major hack, forcing the company to shut down its PlayStation network for three weeks, and compromising the personal information of more than 77 million users.Furthermore, in 2014, hackers released a trove of confidential data from Sony Pictures Entertainment, including sensitive employee information, emails between Sony executives and copies of the then unreleased film, The Interview.Several years ago, Rival Microsoft introduced 2FA for its Xbox live network, alongside numerous other large firms, including Google, Amazon and Facebook.The feature is now available for PS3, PS4, PlayStation Vita, PlayStation TV, PlayStation Portable and Xperia devices.


T-Mobile’s Data Plan Violates Net Neutrality Rules In US

(PC-google images)

The new unlimited data plan of T-Mobile One is causing serious concerns for people as it may violate net neutrality rules in US.

The Electronic Frontier Foundation believes that T-Mobile’s new One plan, which offers unlimited data, calls, and texts, may fall afoul of net neutrality rules due to the restrictions that it imposes on how customers can consume data.

T-Mobile One offers unlimited video streaming at 480p, but getting HD video will cost you an extra $25 a month per line. Many are saying this violates net neutrality, and even the Electronic Frontier Foundation has spoken up.

EFF senior staff technologist Jeremy Gillula told the Daily Dot that, based on what his group has read about T-Mobile One so far, “it seems like T-Mobile’s new plan to charge its customers extra to not throttle video runs directly afoul of the principle of net neutrality.” He added that T-Mobile One’s video throttling could also violate the FCC’s Open Internet Order that says that “ISPs can’t throttle traffic based on its type, or charge customers more in order to avoid discriminatory throttling.”

On accused of violating the net neutrality rules, T-Mobile CEO John Legere gave his clarification.

“Listen, we have made it painfully clear from the beginning, we are pro net neutrality. This is all about customer choice. So if a customer buys this program, we will, based upon the offer itself, deliver them video at standard definition. If they want Ultra HD and they upgrade and pay the $25, we will give them that, too. That’s choice.

“We actually believe that there were questions associated with how we got here, and this is a very strong statement of responding to what we think are the things that are very important from a net neutrality standpoint. I’m glad to have that discussion, but it is clearly not an anti-net neutrality position.”

This isn’t the first time that T-Mobile has been accused of violating net neutrality. In the months following last year’s launch of Binge On, there were several accusations of net neutrality violations.


$378,000 Malware Attack Leads Thai Bank to Shut Down Half of Its ATMs

The Government Savings Bank (GSB) of Thailand shut down nearly half of its ATMs following a malware attack that cost it 12 million baht, or about $378,000.On 23 August, GSB shut down approximately 47 percent of its ATM network when it disabled service to approximately 3,300 of its 7,000 machines. The affected machines are of the Scotland-based NCR brand.The decision follows GSB’s discovery that five Eastern Europeans stole 12 million baht from 21 of its machines in six provinces – Phuket, Surat Thani, Chumphon, Prachuap Khiri Khan, Phetchaburi and Bangkok.According to Bangkok Post, officials involved with the investigation say they have surveillance tapes of the alleged suspects at work. The footage shows them inserting electronic cards made in Ukraine into the 21 ATMs, which had previously been infected with malware. The attackers then dispensed millions of baht before some of them reportedly fled the country.They withdrew the money directly from the bank, GSB president Chartchai Payuhanaveechai is careful to point out, and not from customers’ accounts.“The GSB wants to inform the public and customers about the reason behind the closing of some ATM machines and to prevent more damage to the bank. This theft is not related to customers’ accounts and money.”This might not be the thieves’ first time targeting ATMs, either.Police general Panya Mamen believes the same Eastern Europeans used ATM malware to steal approximately $2.1 million from the top eight banks in Taiwan back in July, forcing the financial institutions to shut down their ATM networks.As quoted by local media:“As of now the evidence we have found makes us confident that this group is linked to the gang who committed a similar robbery in Taiwan. Investigators believe their identity is Eastern European though we are investigating whether any Thais were involved.”Investigators are currently looking for the suspects.In the meantime, GSB has sent infected hard disks of the affected ATMs to NCR for analysis. It has also since resumed service for 3,343 ATMs supplied by the vendor after thoroughly checking those machines.News of this heist follows several months after attackers abused the SWIFT banking network to target banks in Vietnam, Ukraine, Bangladesh, and elsewhere with fraudulent money transfers.