Anyone who visited GeoHot’s PS3 jailbreak website is now part of Sony lawsuit

A judge has ruled that Sony may unmask the identities of anyone who visited the website of George "GeoHot" Hotz, which contained PlayStation 3 jailbreak tools.
George Hotz

A US federal magistrate judge has ruled that Sony may learn the identities of anyone who visited the website of PlayStation 3 jailbreak hacker George Hotz since January 2009, Wired reports.
Hotz — a renowned 21-year-old hacker, famous for his iPhone jailbreaks, who goes by the handle GeoHot — has been accused of violating the Digital Millennium Copyright Act for hacking the Sony PS3 in a way that allows users to install whatever software they like on the normally-closed device. After completing the jailbreak hack, Hotz published an encryption key and software tools on his website, providing anyone with the means to recreate the hack on their own PS3.
The subpoena, issued by Magistrate Joseph Spero of San Francisco, requires Bluehost, which hosts geohot.com, to provide Sony with “documents reproducing all server logs, IP address logs, account information, account access records and application or registration forms” related to Hotz’s website. This includes “any other identifying information corresponding to persons or computers who have accessed or downloaded files hosted using your service and associated with the www.geohot.com website, including but not limited to the geohot.com/jailbreak.zip file.”
Read rest of the story here.

WordPress under hacker attack

WordPress, the platform through which every FP and NP blog has been published for the past 10 months, has been under attack by hackers for the past several hours.
WP has been under attack by hackers for the past several hours.
Readers of Financial Post or National Post blogs might have found them difficult, if not impossible, to access Thursday morning.

That is because WordPress, the platform through which every FP and NP blog has been published for the past 10 months, has been under attack by hackers for the past several hours. Using the same method as the hackers who brought down the main websites of Visa, Mastercard and PayPal last year to support the whistle-blowing website WikiLeaks, Thursday’s attacks have caused thus far untold numbers of WordPress-powered blogs to become nearly inaccessible.
“WordPress.com is currently being targeted by an extremely large Distributed Denial of Service attack [DDoS] which is affecting connectivity in some cases,” said Sara Rosso of WordPress VIP services in a blog post Thursday morning. “The size of the attack is multiple Gigabits per second and tens of millions of packets [of data] per second.”
To read the rest of the story Click HERE.