Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Microsoft joins list of recently hacked companies

The software giant said it was hit with a similar hack to that used against Facebook and Apple

Microsoft has disclosed that it recently fell victim to the same type of cyberattack that targeted Apple and Facebook.

"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations," the company said on its Security Response Center website Friday.

"We have no evidence of customer data being affected and our investigation is ongoing," it said.

Microsoft joins a list of companies that've recently reported being hacked, including Facebook, Apple, Twitter, The New York Times and The Wall Street Journal.

Apple and Facebook were both targeted via a vulnerability in Oracle's Java platform, and Microsoft said Friday it was hit by a similar attack.

"This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," it said.

The Times, the Journal and Apple each pointed at China as the source of the attacks. Twitter didn't say where it thought the attacks originated but urged 250,000 of its users to change their passwords.

China has denied involvement in the attacks.

James Niccolai covers data centers and general technology news for IDG News Service. Follow James on Twitter at @jniccolai. James's e-mail address is james_niccolai@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Apple, Facebook, IDG, Microsoft, Oracle, Wall Street
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: intrusion, security, Microsoft, Exploits / vulnerabilities
Latest Blog Posts
Whitepapers
  • How to Successfully Select an ERP System
    An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.
    Learn more »
  • Delphix and Pure Storage Team to Super-Charge Database Deployments
    This webcast presentation, prepared by Delphix and Pure storage, explores super-charge database deployments and how they can aid business strategy. The presentation details the main features of a new flash solution – high performance, inline data reduction, resilience and scalability, and the value of simplicity. Viewers can learn how to put an end to inefficient or delayed QA, Sharing DB environments, using DB subsets and slow environment builds.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments