Hackers Take Aim at Apple
EUC with HCI: Why It Matters
In a year dominated by large-scale, high-profile security breaches, computer maker Apple has now found itself a target of hackers. The group Anonymous posted a document online that it claims contains a list of usernames and passwords for one of the company's servers, although the group also sent out a message on Twitter saying it wasn't being "so serious" before adding that Apple could be its next target. "But don't worry, we are busy elsewhere," the tweet said.
In the wake of hacks by the group LulzSec and other hacker groups, including attacks on the CIA, the International Monetary Fund, a public network for the United States Senate and defense contractors, the government has been spurred into pushing cyber-security legislation through Congress.
If the Obama administration gets its way, the maximum prison sentence for those convicted of breaking into government computer networks or potentially endangering the country's national security would become 20 years. The White House made the request in its cyber-security proposal in May. Recent attacks on government Websites have refocused attention on that part of the proposal, Reuters reported June 20.
The proposed penalties are also more relevant as cyber-prankster LulzSec and hacktivist collective Anonymous have announced a joint "Operation Anti-Security" venture in which they will attack government Websites and other big corporations, which apparently could include Apple. LulzSec claimed it will go after confidential documents in a move reminiscent of WikiLeaks.
"Trusted malware" is continuing to grow at an alarming rate, according to a new report that provides insight, background and analysis on the trends and developments in the global threat landscape by Internet and mobile security provider AVG Technologies. In the second quarter, AVG's Threat Labs saw an increase in the number of stolen digital certificates used to sign malware, before being distributed by hackers. An increase of more than 300 percent was identified at the start of 2011, compared with the whole of 2010. The "Community Powered Threat Report Q2 2011" noted that the practice of trusting signed files is rapidly losing its strength.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...