the_wizard_man said:
fordy said:
the_wizard_man said:
fordy said: they don't have to exceed security standards, but they at least have to be on par with companies carrying sensitive information. They didn't even follow the tips in Apache's security guide:
http://httpd.apache.org/docs/2.2/misc/security_tips.html
Keep up to Date
The Apache HTTP Server has a good record for security and a developer community highly concerned about security issues. But it is inevitable that some problems -- small or large -- will be discovered in software after it is released. For this reason, it is crucial to keep aware of updates to the software. If you have obtained your version of the HTTP Server directly from Apache, we highly recommend you subscribe to the Apache HTTP Server Announcements List where you can keep informed of new releases and security updates. Similar services are available from most third-party distributors of Apache software.
Of course, most times that a web server is compromised, it is not because of problems in the HTTP Server code. Rather, it comes from problems in add-on code, CGI scripts, or the underlying Operating System. You must therefore stay aware of problems and updates with all the software on your system.
As you can see, it's not that hard to keep up to date. Apache themselves has an announcements list, which only requires a hookup to a feed reader.
Didn't you read my earlier post? I criticize ANY company who has sensitive information taken from them. I'm not a fanboy who kicks up a stink because somebody criticizes about his favourite company.
|
Again what proof do you have that they are behind any companies with equally sensitive information (btw I don't think your name and date of birth is sensitive or your address is all that sensitive either) again address not all that sensitive and nothing else is even close, so yeah and again no proof they are behind the industry standards and you have yet to call any other company or companies in general what you have been calling Sony
|
Are you goddamned dense?
Sony's version level: 2.2.15
Version available at time of the hack: 2.2.17 (By open source standards, this IS the industry standard, as dictated even by Apache)
Do you realise how supidly childish your comments are? Your last sentence translates to "Waah....but you didn't call him names!" and if you paid attention and took off your rose tinted glasses you'd see that I criticized Apple earlier in this very thread!If you honestly wish to lose any shred of credibility you have left here, please by all means, continue...
|
So in otherwords you have no proof that majority of companies who have the same kind of info that Sony have updated anymore then they have
|
Once again, back to the "everyone else is doing it" fallacy. If "other companies" are doing the same thing, then I look forward to bashing them out too when their info is breached.
Here are the main points:
- Apache had an update available for the past 11 months. In fact, they had 2
- Sony didn't implement it
- Hackers used a well known exploit fixed by said updates to get to sensitive information.
No ifs, buts or whats. That is negligence, full stop. Are you going to defend BP next? "Well, Exxon also don't provide routine maintenance to their oil rigs. BP doesn't deserve this!" Your stance is a goddamn joke!