123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

News Corporation Websites Under The Radar Of Lulz Sec And Anonymous

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Lulz Sec, the disbanded cyber-attack group has resurfaced again. In the latest attack, Lulz Sec targeted various British websites related to the Rupert Murdoch owned News Corporation. The company had disabled the server after Lulz Sec defaced the website of The Sun to avoid further security breach. The group reportedly posted a fake story on the website of The Sun. The fake story announced that the death of Rupert Murdoch. The story claims that the media baron collapsed in the garden, after consuming some palladium, a chemical in the Kitchen. The company acted swiftly to remove the fake story from the site, but attackers redirected the website to the Twitter account of Lulz Sec. The attack group has claimed access to the login credentials of Rebekah Brooks, who recently resigned as the Chief Executive of News International, Bill Akass, former managing editor and personal accounts of The Sun staffers.

The Anonymous group has also reportedly claimed responsibility for bringing down the website of The Times and claims to have access to personal data related to the employees of the News group. Other group websites such as ...
... the Sunday Times and News International Site were not accessible. Lulz Sec has warned that the latest attack is only Phase 1 of the new wave of attacks.

The news group has been at the center of a major phone tapping controversy in United Kingdom (U.K), which forced the company to shut down popular 'News of the World' Tabloid. The latest attack comes at a time when Rupert Murdoch and his son James Murdoch are due to appear before a U.K Parliamentary committee. Both Anonymous and Lulz Sec are infamous for distributed denial-of-service attacks on websites. Lulz Sec gained instant attention by launching frequent attacks, announcing the attack on Twitter and publishing extracted details online. Lulz Sec's onslaught made other groups to swing into action.

Last month, the group had announced dissolution after a 50 day saga of cyber-attacks on high profile websites. The announcement followed publication of leaked Internet Relay Chat (IRC) logs between various members of the group. A rival attack group TeaMp0ison also claimed access to the details of Lulz Sec members. More recently, another Rival attacker Jester claimed to have unmasked the real identity of Sabu, the head of Lulz Sec. Various reports suggested that members of the group had joined Anonymous and other attacking groups. Frequent attacks pose challenge for the law enforcement. Counter crime professionals may leverage online IT degree programs and online computer forensics training programs to enhance their capabilities in combating sophisticated threats.

Organizations must conduct in-depth security evaluation at regular intervals through penetration testers. Penetration testers use attack tools to identify the weaknesses in the IT infrastructure. Professionals qualified in IT degree programs may help organizations in understanding the business environment and modifying the security policies in accordance with the threat scenario.

IT professionals must place emphasis on improving security practices in the organization through mock tests and training sessions. They must sensitize employees on the implications of negligent security practices. Employees may benefit from online IT courses and adopt secured practices.

Total Views: 445Word Count: 520See All articles From Author

Add Comment

Computers Articles

1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech Gazebos
Author: Tech Gazebos

2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk

3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller

4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp

5. Spark Matrix™: Ai Observability Solutions
Author: Umangp

6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT

7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10

8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware

9. Buy Epson Thermal Printer: What To Know
Author: pbs

10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware

11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin

12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy

13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies

14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway

15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: