ALL >> Computers >> View Article
Lulz Sec Targets Website Of Central Investigative Agency

In yet another security incident, cyber-attack group Lulz Sec, has reportedly targeted the website of Central Intelligence Agency (CIA), the premier intelligence agency of the United States (U.S). Visitors to the agency's website faced problems in accessing the site for some duration. The website offers loads of information economic, political, and geographic information related to many countries worldwide. IT Security professionals of the agency are investigating the attack. Cyber-attacks have become a regular phenomenon in the recent times. The cyber-attack group has been frequently targeting different government and corporate websites.
Lulz Sec recently made multiple attempts to intrude into the servers of the U.S Senate. However, a firewall prevented the attackers from gaining access to any proprietary information. The group has generated lot of attention through continuous spate of attacks. The group has also earned notoriety by publishing confidential information online. Frequent attacks have raised concerns of information security professionals of organizations, as any breach of personally identifiable information ...
... and business related data has adverse repercussions. Cybercriminals may misuse published confidential details for perpetrating fraud, impersonation, and unauthorized access to user accounts. Attackers may also use extracted information to launch spear phishing attacks, and extract more personal and business related information. Recently, Malaysian government increased surveillance of government websites after threat from another cyber-attack group 'Anonymous'.
Organizations must conduct regular in-depth security evaluation, identify and remediate security flaws before their exploitation by the cyber-attackers. Professionals qualified in masters of security science, and IT degree programs may help organizations in proper evaluation of security threats, and implementation of preventive mechanisms to secure the IT security apparatus.
Recently, Internet Security firm Symantec categorized the latest security threats into malware attacks, targeted attacks and those for generating publicity. Recent malware attacks attempted to leverage on political events, natural disasters, and celebrity related events to trick users into visiting malicious websites or purchasing fake anti-virus software and extracting confidential financial information. Attacks involving cyber weapons such as Stuxnet, and spear phishing attacks come under the second category. Recent target-based attacks include the attempts to compromise Gmail accounts. Security awareness training programs are crucial to update employees on the prevailing security environment. E-learning, online IT degree programs, and e-tutorials may enable employees to understand and implement best practices in IT security. Many of the recent incidents fall under the third category characterized by indiscriminate attempts to breach the security of government, business, and media networks. The frequent, sophisticated and diverse threats make it inevitable for IT professional to update their technical expertise. Online video training and online IT courses may facilitate professionals in acquiring requisite skill sets and enhancing their capabilities to deal with different forms of cyber security threats.
Often, organizations find it difficult to devote appropriate resources for IT security resulting in security flaws, misguided patches, and lack of proper monitoring. However, lax security procedures may cause security incidents leading to loss of productive business hours, financial loss, poor service quality and attract negative publicity. As such, organizations must treat IT security as a constant process rather than a one-time activity.
Add Comment
Computers Articles
1. How A Free Seo Checker Can Help You Understand And Improve Your WebsiteAuthor: Mahesh
2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill
3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong
4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos
5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape
6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia
7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong
8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders
9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape
10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong
11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal
12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong
13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams
14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders
15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani