Threat Of Christmas Research Paper

Improved Essays
It appears like a group of stupid teens are looking to get themselves on the naughty list this year. They call themselves the Phantom Squad and they warn that they will shut down Xbox Live and PSN on Christmas. Find out why this is a sad attempt by these stupid teens. They need to go get some advice from an actual hacking group named Anonymous.

PHANTOM SQUAD UNLEASHES THREAT TO XBOX LIVE AND PSN USERS

This threat was issued by this group on a post on Twitter. The tweet read that they will shut down Xbox Live and PSN on Christmas. They tweet also said that both of these services would be down the whole week. They were asked why they were doing this and they responded by saying they do it because cyber security does not exist. However, it does appear that they have since fled Twitter. Another thing that needs to be
…show more content…
This group called themselves the Lizard Squad. Well, at least the Phantom Squad gave themselves a cool name. Anyway, they attacked Xbox Live and PSN and ruined many gamers Christmas's. However, most of them were arrested and they provided the world with an annoying event. Also, it should be noted that causing an attack like this does not even require hacking. All that needs to be done is to overload the servers until they can not respond. Anonymous would be ashamed of these group.

ANONYMOUS WOULD BE ASHAMED

These stupid teens are probably acting like their hot shots because they can do this. However, they need to talk to Anonymous about real hacking. The entitled group is a very well known hacking group. Some people have called them influential, while others have called them cyber terrorists. Many members of this hacking group have been arrested for cyber attacks. Whether or not they are good or bad is up for debate. However, what is not up for debate is the fact that The Phantom Squad needs to take notes from Anonymous before they do anything.

SO CAN XBOX AND PLAYSTATION STOP THE PHANTOM

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Summary: The Mining Dead

    • 152 Words
    • 1 Pages

    Because the game is more about making yourself do the best you can, hackers are rare, and when they are present, they do not affect your gameplay. This server features awesome voting rewards,…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Generally, a hacktivist attacks using a denial of service method. This technique overloads the server until it finally crashes. When a hacktivist targets a healthcare provider, he or she is looking to attain specific information about intellectual property, patient data or to embarrass the…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Ransomware Gangs

    • 61 Words
    • 1 Pages

    The results have included death threats against these white hats as well as their cars vandalized, homes broken into etc. This is notable since it suggests these Ransomware gangs might be operating within countries like Canada or the U.S. if they’re able to hit their targets so directly. Additionally the gangs are employing identity theft and posting family members info…

    • 61 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Albert Gonzalez is an American hacker and computer criminal who is included in the charge card robbery and exchanging of more than 170 million cards and ATM numbers from 2005 through 2007. He is otherwise called "Segvec," "Soupnazi" and "J4guar" among Internet circles. Gonzalez and his group utilized Wardriving and SQL infusion to send auxiliary sections on a couple of corporate structures to dispatch bundle sniffing (especially, ARP Spoofing) ambushes which allowed him to take PC data from inward corporate frameworks. Gonzalez had three government indictments: 1. May 2008 in New York for the Dave and Buster's case 2.…

    • 910 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    As a product of today’s game consoles becoming more and more advanced, it is becoming easier for attackers to gain access to them. The purpose of this paper is to gain a better understanding of how these attacks occur and what can be done to protect oneself in situations such as this. I will attempt to examine multiple resources that can better explain things further. Game console attacks are rapidly increasing, consumers purchase roughly over one hundred million consoles each year which all connect to the internet to play and interact with countless servers and other users around the world.…

    • 440 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    From the website, “Wikipedia.com” it told me everything I needed to know. The two perpetrators were, Eric Harris and Dylan Klebold. What caused them to do that was because they were bullied, they had personal stress, terrorism and violent games. If a video game has bombs and guns, it may influence someone to do something bad, that they saw on a video game. Due to all those motives, they ended up killing their selves.…

    • 411 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Gunpowder Plot Of 1605

    • 771 Words
    • 4 Pages

    The Gunpowder Plot of 1605, a small group under Robert Catesby put together a plan to kill King James I and members of the house of parliament that were making life difficult for the Catholics. This is an important event in British history because, it almost ended the lives of the biggest Protestant leaders of that time. Also, how the event that happened over 400 years ago affect people today. After Queen ELizabeth I died in 1603, Catholics hoped her next successor James I. Having a Catholic mother, they hoped he would be more tolerant towards their religion. Unfortunately, King Jame I turned out to be even more tolerant than Queen Elizabeth I. (The Gunpowder Plot of 1605)…

    • 771 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This is where the Net Force Explorers a group of whiz kids come in. They can access every nook and cranny of the internet and fight cyber hackers better than anyone. In High Wire, the explorers have to fight a highly sophisticated black market that deals with high tech hardware and software used by cyber…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ashley Madison Case Study

    • 1269 Words
    • 6 Pages

    Ashley Madison: Life is short, have an affair. As if we didn’t have enough problems. The company is based in Canada and while ethically not the best business model, seemed to have a rather wide consumer base. From Josh Duggar to government employees, with the U.S. population having 318 million [1] people and Ashley Madison had 32 million [2] about 1 in 10 people are registered for this site (roughly). Hackers have always had their own set of principles outside of the normal person.…

    • 1269 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal. Furthermore, this hacktivist stereotype is further fed if the hackers hold the view that Pierluigi mentions, “Those members [certain Anonymous members] that act just to refuse any social rules… profess themselves anarchists, they operate to destroy and create chaos” (“Anonymous Ethical code. Back to the origins”). No one can deny the immorality of certain actions done by activists, but some appear to be ignorant of the positive…

    • 1010 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Console Slave Analysis

    • 1164 Words
    • 5 Pages

    Anyone who can play these games for years on end and still get enjoyment from them is certainly a strange specimen. At least to me. THE “HACKER” “FileSystemOperations.cleo IniFiles.cleo IntOperations.cleo Did it crash yet?”…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    SQL Injection Attacks

    • 1338 Words
    • 6 Pages

    Structured Query Language (SQL) injection attacks have been around for nearly two decades and have posed a threat to companies and government agencies around the world (SQL Injection Defense, n.d). The former head of payment security for Barclaycard, Neira Jones, states; “some 97 percent of database attacks worldwide are still due to SQL injection somewhere along the attack chain (SQL Injection Defense, n.d). A SQL injection attack can lead to an unauthorized access to database content and web portals. The SQL commands consist of statements that, when executed, are going to interact with a system’s database.…

    • 1338 Words
    • 6 Pages
    Great Essays