123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Attackers Target Apple, Steal Login Credentials

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, Anonymous group reportedly claimed access to administrative login credentials associated with an Apple server. The self-proclaimed Internet vigilante group also allegedly posted a link of the compromised server. The latest attack seems to part of the Anti-Sec campaign, which attackers claim to be targeted at corrupt governments and organizations. Attackers were reportedly successful in extracting at least 26 administrative login credentials. Apple has not yet confirmed the security incident. Over the last few months, there have been a series of attacks on government and corporate websites, which include U.S Senate, Central Intelligence Agency (CIA), various websites of Sony Corporation, AT&T as well as several Malaysian, Turkish, Brazilian government websites. Recently, attackers also targeted Viacom, Universal Music Group, several Orlando city related websites, and Arizona Department of Public Safety. The attack group has also warned of further attacks targeted on the developer.

Structured Query Language (SQL) is used to support SQL-based database systems. Websites are supported by these database systems. ...
... Cyber-attackers use SQL injection to gain access to databases associated with the website and view, extract, delete or alter the contents. Attackers use a malicious script in the form database query. The script is injected into the strings by inserting special characters, terminating and appending text strings, inserting erroneous entries to alter the inputs before their execution. SQL injection attacks could be prevented through appropriate input validation, escaping user input and using stored procedures. Parameterized queries could be used to prevent use of special characters. Restricting use of SQL statements and allowing only those statements that are used by the application may also help in preventing SQL injection attacks. On gaining access to confidential customer and business databases, attackers may use the information to compromise more user accounts or launch more sophisticated attacks. Attackers may also place the extracted information online.

Organizations must make regular evaluation of the website security. Professionals qualified in secured programming and penetration testing may detect and remediate security vulnerabilities. IT masters degree and computer science degree holders may help in appropriate assessment of security risks. Organizations must place high emphasis on ensuring confidentiality, integrity and security of databases. Proactive approach is crucial to deal with persistent attacks, security and data breach incidents. Security certification and online university degree programs may help cyber security professionals to meet their training requirements.

Governments must have a robust policy to tackle consistent threats to public bodies and private corporations. Creation of cyber security centers by pooling cyber security expertise from various departments, corporations and counter crime agencies may help in identifying security threats, making appropriate assessment, evaluating their impact, and devising appropriate risk responses. Attacks on critical infrastructure may have serious repercussions on business and economy. Information sharing among different government, corporate, law enforcement and security researchers could facilitate initiation of appropriate measures to secure the IT infrastructure from identified threats. Governments may collaborate with educational institutions and universities to devise and promote online degree programs on cyber security to meet the future needs of IT experts and improve computing practices among Internet users.

Total Views: 179Word Count: 509See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: