Microsoft joins list of recently hacked companies
- 22 February, 2013 23:57
Microsoft has disclosed that it recently fell victim to the same type of cyberattack that targeted Apple and Facebook.
"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations," the company said on its Security Response Center website Friday.
"We have no evidence of customer data being affected and our investigation is ongoing," it said.
Apple and Facebook were both targeted via a vulnerability in Oracle's Java platform, and Microsoft said Friday it was hit by a similar attack.
"This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," it said.
The Times, the Journal and Apple each pointed at China as the source of the attacks. Twitter didn't say where it thought the attacks originated but urged 250,000 of its users to change their passwords.
China has denied involvement in the attacks.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
How to Switch From iPhone 5S to BlackBerry Z30 (and Why)
CIOs to Become In-House Brokers -- and That's a Good Thing
The future of computing
10 Hot Hadoop Startups to Watch
The future of computing
Is Your IT Infrastructure Keeping Up?
This helpful infographic demonstrates how, when IT is the backbone of modern business, a converged infrastructure system can solve the challenge of cost, complexity, availability, rapid provisioning and flexibility.
Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
The F5 DDoS Protection Reference Architecture part 2 of 3
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.