123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cyber-attack Group Publishes Confidential Login Credentials

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A fortnight after the dissolution of Lulz Sec, which hit headlines for wave of cyber-attacks, security and data breaches continue to haunt government bodies and private corporations. The Lulz Sec hurricane lasted for fifty days, and now their peers in the crime world are taking forward their mission (illegal). In the latest incident, a cyber-attack group called Connexion reportedly published around 17,000 e-mail addresses and passwords pertaining to United States (U.S) government and military agencies on a third party file sharing site. According to SC Magazine, the published e-mail addresses include those related to the National Security Agency, Department of Homeland Security (DHS), and several other state government bodies.

This is the second disclosure by the group in one week. Connexion had earlier dumped information related to patrons apparently from the website of California Fair Political Practices Commission. The passwords dumped in the latest venture of the group are associated with several Yahoo, Gmail, Hotmail, MSN and Verizon accounts. However, the group has withheld the passwords associated with military ...
... and other important e-mail accounts.

The attack group has reportedly announced its intention to recruit new members. The group is apparently creating a website, and candidates who are able to breach the site will be eligible for consideration for inclusion as a member of the group.

Anonymous, on the other hand, has continued its attacks, even after several arrests by counter crime agencies in different countries. The spate of attacks has raised the concerns among cyber security professionals and investigative agencies. Recently, several countries came together to support a business led International Cyber Security Protection Alliance (ICSPA) in United Kingdom. The alliance aims to aid counter crime agencies both in terms of funding and expertise. Coordination and information sharing between different counter crime agencies, businesses and government bodies is crucial to fight cybercrime. IT professionals may take advantage of online technology degree programs to abreast themselves of latest technological developments and enhance their technical expertise.

Organization must place high emphasis on securing the IT network infrastructure from cyber intrusions and unauthorized access to confidential information. Professionals qualified in IT masters degree and masters of security science may help organizations in proactive assessment of security threats and initiate measures to strengthen the defenses of the IT infrastructure.

Organizations must advise employees on password construction, data encryption and precautions in transmitting information through e-mail. E-learning and online computer degree programs may help employees in improving information security practices.

Total Views: 259Word Count: 407See All articles From Author

Add Comment

Computers Articles

1. Employee Attendance System | 1 Sgd Mobile Attendance
Author: knani

2. Employee Mobile App For Time Attendance In Singapore
Author: knani

3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi

4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi

5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi

6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi

7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi

8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi

9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi

10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi

11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi

12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi

13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi

14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine

15. Trending Technologies In Frontend Development
Author: davidjohansen

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: