Maybe if the dev network let people have infinite funds and hackers "bought" huge numbers of psn cards (not sure if the dev network really lets you do that), Sony would have to shut down the store to prevent these cards from being redeemed.
Any group of determined and organized script kiddies can get anything done. It's just a matter of...being determined and organized. If they felt like going after XBL, they would have taken that down too.
Having your entire protocol based on HTTP(s) webservices makes it a much easier target than a proprietary (as far as I know) protocol like the one used for Xbox Live. First it enables DDOS attacks from any botnet, but also makes automated testing for injections much more easier as well.
Not that using webservices is a bad idea, it just facilitates finding issues if done improperly. Sony more than likely based part of their client/server security on the fact that the client side (the PS3 itself) wasn't hackable and thus all the HTTPS communication would never be decrypted. Once you know what a webservice uses as parameters, it's easy to automate a testing system, or even just play around it from your browser directly.
Did their tinychat window close permantely or something, they couldn't break balls privately? not sure why this just had to be an article, especially when people's personal details could be exposed and fraudulent deductions could be being made right now across and a wide spectrum.
Just to shit-stir the yokles in the office down the hall.
I had five 360s break on me but I thought MS handled it pretty well. A simple 5 minute phone call, coffin mailed to me, a week later I got a "new" one. Considering how bad they botched the system I thought they did pretty good damage control and the new systems seem to be RRoD free.
And I believe they were raked over the coals in the media and most still talk about it to this day (in passing). It's a permanent black eye on the 360.