source : https://www.google.com.pk/search?hl=en&site=imghp&tbm=isch&source=hp&biw=1366&bih=599&q=wikileaks+releases+hacked+sony+documents%2c+revealing+poor+password+practices&oq=wikileaks+releases+hacked+sony+documents%2c+revealing+poor+password+practices&gs_l=img.12…1792.1792.0.3347.1.1.0.0.0.0.229.229.2-1.1.0.msedr…0…1ac.1.64.img..1.0.0.jnp22eup4is#hl=en&tbm=isch&q=cylon+logo&imgrc=wse233ecbypznm%253a%3b5i-97kcvpgrcam%3bhttp%253a%252f%252fi532.photobucket.com%252falbums%252fee328%252fnashslash%252fmisc%252fcylonbasestarlogotheory.jpg%3bhttp%253a%252f%252fwww.byyourcommand.net%252fcylonforum%252fviewtopic.php%253ft%253d620%3b280%3b268
Information Security Buzz is an independent resource that provides the experts’ comments, analysis, and opinion on the latest Cybersecurity news and topics