This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/go/rss/int/news/-/news/business-13636704

The article has changed 7 times. There is an RSS feed of changes available.

Version 0 Version 1
Sony network attacked again Sony network attacked again
(40 minutes later)
A hacker group has claimed it has attacked the Sony network and stolen more than one million passwords, email addresses and other information.A hacker group has claimed it has attacked the Sony network and stolen more than one million passwords, email addresses and other information.
Lulz Security said it broke into servers which run SonyPictures.com.Lulz Security said it broke into servers which run SonyPictures.com.
It said it had hacked into a database that included unencrypted passwords as well as names, addresses and dates of birth of Sony customers. Sony said it was aware of Lulz Security's statement and was investigating, the Associated Press reported.
In April, hackers broke into Sony's PlayStation Network and stole data from more than 77 million accounts.In April, hackers broke into Sony's PlayStation Network and stole data from more than 77 million accounts.
That attack was considered the biggest in internet history and led to Sony shutting down the PlayStation Network and other services for almost a month.
In a statement on Thursday, Lulz Security said it had hacked into a database that included unencrypted passwords as well as names, addresses and dates of birth of Sony customers.
"From a single injection, we accessed EVERYTHING," it said. "Why do you put such faith in a company that allows itself to become open to these simple attacks?"
The group also recently claimed responsibility for hacking the website of the PBS network and posting a fake story in protest of a new programme on WikiLeaks.
Are you affected by any of the issues raised in this story? Send us your comments and experiences using the form below.