ALL >> Computers >> View Article
Cyber-attack Group Publishes Confidential Login Credentials
A fortnight after the dissolution of Lulz Sec, which hit headlines for wave of cyber-attacks, security and data breaches continue to haunt government bodies and private corporations. The Lulz Sec hurricane lasted for fifty days, and now their peers in the crime world are taking forward their mission (illegal). In the latest incident, a cyber-attack group called Connexion reportedly published around 17,000 e-mail addresses and passwords pertaining to United States (U.S) government and military agencies on a third party file sharing site. According to SC Magazine, the published e-mail addresses include those related to the National Security Agency, Department of Homeland Security (DHS), and several other state government bodies.
This is the second disclosure by the group in one week. Connexion had earlier dumped information related to patrons apparently from the website of California Fair Political Practices Commission. The passwords dumped in the latest venture of the group are associated with several Yahoo, Gmail, Hotmail, MSN and Verizon accounts. However, the group has withheld the passwords associated with military ...
... and other important e-mail accounts.
The attack group has reportedly announced its intention to recruit new members. The group is apparently creating a website, and candidates who are able to breach the site will be eligible for consideration for inclusion as a member of the group.
Anonymous, on the other hand, has continued its attacks, even after several arrests by counter crime agencies in different countries. The spate of attacks has raised the concerns among cyber security professionals and investigative agencies. Recently, several countries came together to support a business led International Cyber Security Protection Alliance (ICSPA) in United Kingdom. The alliance aims to aid counter crime agencies both in terms of funding and expertise. Coordination and information sharing between different counter crime agencies, businesses and government bodies is crucial to fight cybercrime. IT professionals may take advantage of online technology degree programs to abreast themselves of latest technological developments and enhance their technical expertise.
Organization must place high emphasis on securing the IT network infrastructure from cyber intrusions and unauthorized access to confidential information. Professionals qualified in IT masters degree and masters of security science may help organizations in proactive assessment of security threats and initiate measures to strengthen the defenses of the IT infrastructure.
Organizations must advise employees on password construction, data encryption and precautions in transmitting information through e-mail. E-learning and online computer degree programs may help employees in improving information security practices.
Add Comment
Computers Articles
1. How To Build A Peer-to-peer Marketplace?Author: brainbell10
2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10
3. Everything You Need To Know About Web Development In 2026
Author: chetna
4. Create A Strong Online Presence Today
Author: FutureGenApps
5. User Experience Design
Author: brainbell10
6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10
7. The Thrilling World Of Geometry Dash Lite
Author: Hattie
8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas
9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas
10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC
11. Unreal Game Development
Author: brainbell10
12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp
13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management
14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify
15. Why Choose Sataware?
Author: brainbell10






