{"id":2073,"date":"2011-06-14T07:07:37","date_gmt":"2011-06-14T00:07:37","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2011\/06\/14\/bethesda-hacked-we-wonder-who-is-next-ubergizmo\/"},"modified":"2011-06-15T08:30:57","modified_gmt":"2011-06-15T01:30:57","slug":"bethesda-hacked-we-wonder-who-is-next-ubergizmo","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/06\/bethesda-hacked-we-wonder-who-is-next-ubergizmo\/","title":{"rendered":"Bethesda hacked, we wonder who is next?"},"content":{"rendered":"<p>Game Rant Bethesda hacked, we wonder who is next Ubergizmo Starting off with Sony&#8217;s much publicized downtime for their PlayStation Network ( PSN ) as well as Qriocity service (which incidentally has been brought online just recently), not to mention having Codemasters and Epic Games being breached (in addition &#8230; &#8216;Skyrim&#8217; Publisher Bethesda Softworks Hacked Game Rant Bethesda&#8217;s Brink Website Hacked, Lulzsec Takes Credit [Lulzsec Turns Their &#8230;<\/p>\n<p><!--more--><\/p>\n<p>we can just do nothing but sit back and wonder  just when all the madness is going to stop. The answer? Not anytime  soon, as the latest victim to fall under the hacking wave is Bethesda,  who confirmed that websites related to their new first-person shooter  Brink were breached during the weekend, with the hackers most possibly  carting away some personal information. Bethesda reassures their  customers that all relevant financial information remain safe, so that  ought to help you sleep better at night.<\/p>\n<p>What migth ahve been compromised, however, would be \u201cuser names,  email addresses, and\/or passwords,\u201d so it would be prudent to start  changing those passwords if you happen to own an account on any of  Bethesda\u2019s sites.<\/p>\n<p>Hacker group <a href=\"http:\/\/www.ubergizmo.com\/2011\/06\/stolen-sony-developer-network-code-released-by-lulzsec\/\">Lulzsec<\/a> is proud to be responsible for the hacking, touting over their Twitter  account that they did so because they could and Bethesda did not stop  them, \u201cBethesda, we broke into your site over two months ago. We\u2019ve had  all of your Brink users for weeks. Please fix your junk, thanks!\u201d What a  start to the week, no?<\/p>\n<p>&nbsp;<\/p>\n<p>Continue reading here:<br \/>\n<a title=\"Bethesda hacked, we wonder who is next - Ubergizmo\" href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;usg=AFQjCNH2wiubsXzPZ1Kd_VhO50q3mhvRBw&amp;url=http:\/\/www.ubergizmo.com\/2011\/06\/bethesda-hacked\/\" target=\"_blank\">Bethesda hacked, we wonder who is next &#8211; Ubergizmo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Game Rant Bethesda hacked, we wonder who is next Ubergizmo Starting off with Sony&#39;s much publicized downtime for their PlayStation Network ( PSN ) as well as Qriocity service (which incidentally has been brought online just recently), not to mention having Codemasters and Epic Games being breached (in addition &#8230; &#39;Skyrim&#39; Publisher Bethesda Softworks Hacked Game Rant Bethesda&#39;s Brink Website Hacked, Lulzsec Takes Credit [Lulzsec Turns Their &#8230; <\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[764,3,612],"tags":[589,728,585,586],"class_list":["post-2073","post","type-post","status-publish","format-standard","hentry","category-lulz","category-security","category-sony-2","tag-games","tag-lulzsec-turns","tag-network","tag-station-network"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-xr","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=2073"}],"version-history":[{"count":3,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2073\/revisions"}],"predecessor-version":[{"id":2127,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2073\/revisions\/2127"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=2073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=2073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=2073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}