The first major targets of social media hackers were Facebook and Twitter. Their attacks seemed like they could be isolated events, but this was hopeful dreaming on the part of consumers and businesses alike. Hackers had too many dreams to live through. These breaches in security were only the beginning of massive invasions that were about to strike the internet.
In the last couple of years and even more so in the last few months, many companies have reported security breaches on large scales. Many social media companies including Tumblr and Pinterest, as well as major companies including Microsoft and Zendesk have all reported problems with repeated hack attacks.
Fortunately much of the data these companies preserve has not yet been infected, although malware has been spotted on hardware and throughout some PCs. Some believe they have found the sources of the attacks, but this has yet to be fully proven. Many suggest that the hackers are conducting research as well as performing attacks. Their goals include uncovering as much research as possible about the companies they are attacking.
Microsoft has not had much to say about the incidents that are occurring, although it has been hit hard. Interestingly, hackers are using similar attacks with similar companies, apparently seeking out the same information. This was true of Apple and Microsoft, where the same hacking patterns were used purportedly to research the same information within the companies. What exactly are the hackers looking for?
What Hackers Look For
Perhaps they are looking to unlock major corporate systems for themselves or others. At Zendesk, hackers gained hold of consumer email addresses and the information contained within their customer reply and support emails, which can severely damage the firm as well as the customers that work with the firm. The company was able to close off their security breach and is currently working with law enforcement agents to investigate and charge the culprits. Other companies including Tumblr are working with customers asking if they could verify whether they sent personal information to support teams to prevent false inquiries and a method for hack attacks to take place.
One of the best steps to protect your PC is to simply disable java. Some consumers may find upgrading to the newest version may be enough to protect their computers. Private proxy companies can also provide protections. This provides protection by making sure the proxy is on during the entire time the computer is on, allowing for privacy while surfing and conducting business.
You can follow any responses to this entry through the RSS 2.0 feed.
Leave your comment