ALL >> Computers >> View Article
Cyber-attack Group Publishes Confidential Login Credentials
A fortnight after the dissolution of Lulz Sec, which hit headlines for wave of cyber-attacks, security and data breaches continue to haunt government bodies and private corporations. The Lulz Sec hurricane lasted for fifty days, and now their peers in the crime world are taking forward their mission (illegal). In the latest incident, a cyber-attack group called Connexion reportedly published around 17,000 e-mail addresses and passwords pertaining to United States (U.S) government and military agencies on a third party file sharing site. According to SC Magazine, the published e-mail addresses include those related to the National Security Agency, Department of Homeland Security (DHS), and several other state government bodies.
This is the second disclosure by the group in one week. Connexion had earlier dumped information related to patrons apparently from the website of California Fair Political Practices Commission. The passwords dumped in the latest venture of the group are associated with several Yahoo, Gmail, Hotmail, MSN and Verizon accounts. However, the group has withheld the passwords associated with military ...
... and other important e-mail accounts.
The attack group has reportedly announced its intention to recruit new members. The group is apparently creating a website, and candidates who are able to breach the site will be eligible for consideration for inclusion as a member of the group.
Anonymous, on the other hand, has continued its attacks, even after several arrests by counter crime agencies in different countries. The spate of attacks has raised the concerns among cyber security professionals and investigative agencies. Recently, several countries came together to support a business led International Cyber Security Protection Alliance (ICSPA) in United Kingdom. The alliance aims to aid counter crime agencies both in terms of funding and expertise. Coordination and information sharing between different counter crime agencies, businesses and government bodies is crucial to fight cybercrime. IT professionals may take advantage of online technology degree programs to abreast themselves of latest technological developments and enhance their technical expertise.
Organization must place high emphasis on securing the IT network infrastructure from cyber intrusions and unauthorized access to confidential information. Professionals qualified in IT masters degree and masters of security science may help organizations in proactive assessment of security threats and initiate measures to strengthen the defenses of the IT infrastructure.
Organizations must advise employees on password construction, data encryption and precautions in transmitting information through e-mail. E-learning and online computer degree programs may help employees in improving information security practices.
Add Comment
Computers Articles
1. Access Review Fatigue Is Not A People Problem. It Is A Design ProblemAuthor: Tushar Pansare
2. Which Is The Best Data Recovery Service Provider In Delhi?
Author: Stellar Data Recovery India
3. Microsoft Access 2024 Vs. Microsoft Excel 2024: Which Tool Should You Use?
Author: davudobuya55
4. When Identity Governance Becomes An Audit Ritual
Author: Mansoor Alam
5. Power Virtual Agents To Microsoft Copilot studio
Author: brainbell10
6. Dream11 Clone App Guide For The Upcoming Ipl Season
Author: Jorden James
7. Computer Network Tutorial: Step-by-step Guide To Networking Fundamentals
Author: Tech Point
8. Ai Video Creation Services In Chandigarh | Growchip Ai Technologies
Author: AI Video Creation Services
9. Why Online Privacy Matters More Than Ever In 2026
Author: Faraz
10. Spark Matrix™: Data Integration Tools
Author: Umangp
11. D365 Consultant Business Success
Author: brainbell10
12. Medical High-end Touch Monitor From Fortec Integrated
Author: FORTEC Integrated GmbH
13. Why Rugtek Ls3002 Is Best For Retail Barcode Scanning
Author: prime pos
14. Spark Matrix™: Conversational Commerce
Author: Umangp
15. Multi-path Cellular Aggregation | Cellular Sd-wan India | Smoad
Author: SMOD






