ALL >> Computers >> View Article
Cyber-attack Group Publishes Confidential Login Credentials

A fortnight after the dissolution of Lulz Sec, which hit headlines for wave of cyber-attacks, security and data breaches continue to haunt government bodies and private corporations. The Lulz Sec hurricane lasted for fifty days, and now their peers in the crime world are taking forward their mission (illegal). In the latest incident, a cyber-attack group called Connexion reportedly published around 17,000 e-mail addresses and passwords pertaining to United States (U.S) government and military agencies on a third party file sharing site. According to SC Magazine, the published e-mail addresses include those related to the National Security Agency, Department of Homeland Security (DHS), and several other state government bodies.
This is the second disclosure by the group in one week. Connexion had earlier dumped information related to patrons apparently from the website of California Fair Political Practices Commission. The passwords dumped in the latest venture of the group are associated with several Yahoo, Gmail, Hotmail, MSN and Verizon accounts. However, the group has withheld the passwords associated with military ...
... and other important e-mail accounts.
The attack group has reportedly announced its intention to recruit new members. The group is apparently creating a website, and candidates who are able to breach the site will be eligible for consideration for inclusion as a member of the group.
Anonymous, on the other hand, has continued its attacks, even after several arrests by counter crime agencies in different countries. The spate of attacks has raised the concerns among cyber security professionals and investigative agencies. Recently, several countries came together to support a business led International Cyber Security Protection Alliance (ICSPA) in United Kingdom. The alliance aims to aid counter crime agencies both in terms of funding and expertise. Coordination and information sharing between different counter crime agencies, businesses and government bodies is crucial to fight cybercrime. IT professionals may take advantage of online technology degree programs to abreast themselves of latest technological developments and enhance their technical expertise.
Organization must place high emphasis on securing the IT network infrastructure from cyber intrusions and unauthorized access to confidential information. Professionals qualified in IT masters degree and masters of security science may help organizations in proactive assessment of security threats and initiate measures to strengthen the defenses of the IT infrastructure.
Organizations must advise employees on password construction, data encryption and precautions in transmitting information through e-mail. E-learning and online computer degree programs may help employees in improving information security practices.
Add Comment
Computers Articles
1. Employee Attendance System | 1 Sgd Mobile AttendanceAuthor: knani
2. Employee Mobile App For Time Attendance In Singapore
Author: knani
3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi
4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi
5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi
6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi
7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi
8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi
9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi
10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi
11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi
12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi
13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi
14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine
15. Trending Technologies In Frontend Development
Author: davidjohansen