ALL >> Computers >> View Article
Intruders Target Pbs Website, Post Fake News, Disclose Confidential Information
Recently, attackers intruded into the servers and defaced Public Broadcasting Service (PBS) NewsHour blog site. A group called "Lulz Sec" has claimed responsibility for the attack. Intruders were allegedly successful in extracting over 2000 login credentials. Attackers have published the login credentials of employees, passwords related to PBS servers, PBS affiliates, and PBS press accounts. The group has also leaked the network map of the company's website. The distinguishing feature of the latest attack is that attackers also posted fake news on the site. The fake news claimed that singer Tupac Shakur, who died in 1996, is alive and is staying in New Zealand. Attackers are reportedly still posting items on the blog site. Attackers allegedly used SQL injection attack to breach the security of PBS servers.
PBS has started notifying the affected users of the security breach. Information security professionals of the organization are working to reclaim control of the website, and were successful in removing the fake news from the site. The attack was in response to the alleged negative representation of WikiLeaks ...
... in a documentary by PBS Frontline. Lulz Sec has been in the news for attacks on one of Sony companies in Japan, as well as leakage of login credentials of Fox employees. The group was also successful in gaining unauthorized access to Twitter accounts of some of Fox affiliates and posted arbitrary messages.
Cyber-attacks have been vibrant in the current year with several high profile attacks such as the one on HBGary Federal, Hyundai Capital, Epsilon, RSA, SonyPSN network and other Sony companies, and Lockheed Martin. The frequent security and data breach incidents accentuate the need for heightened security measures to safeguard networks, websites, and computer systems. Availability, confidentiality, and security of business and customer information are crucial for uninterrupted business operations, and maintaining public trust.
Proper validation of input and output, use of parameterized queries, encryption of passwords, timely identification of SQL vulnerabilities and application of requisite patches, use of stored procedures and regular security evaluation may help organizations in defending the websites from SQL injection attacks. The highly sophisticated cyber-attacks make it necessary for organizations to ensure that employees are aware of various Internet-based threats and safe online computing practices. Huddle sessions, e-learning programs, introducing rewards and penalties, periodic counseling may help employees in understanding and adhering to best IT security practices. Mandatory diploma and online degree courses on IT security may also help in improving security awareness among employees. The prevailing security scenario makes it important for IT professionals to constantly improve their technical expertise. Working professionals may self-pace their learning through online video training, iPad training, and online university degree courses.
Security and data breach incidents have severe repercussions on the affected parties. Affected individuals and groups must immediately change their passwords. Use of strong and unique password is a fundamental, but often ignored aspect of cyber security. Internet users often use common and easily predictable passwords for the sake of convenience and easy remembrance. Cybercriminals may leverage user negligence and compromise user accounts, conduct unauthorized transactions, transfer funds, misrepresent users, send fictitious and indecent messages, and use e-mail accounts for propagating spam. As such, Internet users must use unique and unpredictable passwords for different online user accounts.
Frequent security breach incidents has led to increased demand for cyber security specialists qualified in computer administration, network administration, incident management, penetration testing, masters of security science, computer science degree, and computer forensics.
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA