Posts Tagged ‘hacker attack’

Security NewsThe website of Apple developers has been hacked

The American company Apple was forced to disable a service for application developers because of a hacker attack, according to the company’s website.

In a statement, the company stated that the attack on the site started last Thursday, and was likely to intruders personal information of registered users of the resource.

“Confidential information are stored in encrypted form, and access to it was closed, but we do not exclude the possibility that the names, addresses and e-mail addresses of some users might fall into the wrong hands,” – said in a statement.

At the moment our specialists are working on strengthening security, software update and restore databases. The exact start time of the resource is not reported. (more…)

Ubisoft database hacked

Ubisoft database hacked

Ubisoft’s user database hacked: users’ e-mails and passwords exposed.

The producer of computer games of Ubisoft reported about breaking of a database of the registered users as a result of unauthorized access to a restricted part of the company website.

As a result of a hacker attack, the attackers got the data users of Ubisoft, including the names of the users of their e-mail addresses and passwords in encrypted form. Billing information in this database was not, as it is stored separately.

“We immediately took steps to block unauthorized access by launching an investigation and stating the fact of a hacker attack to the appropriate service. Internal and external auditors and experts begin the restore integrity of compromised systems,” – said in a statement Ubisoft. (more…)

Hackers attackProtection of databases is one of the easiest tasks. This is due to the fact that databases have a well-defined internal structure, and operations on the elements of the DBMS is quite clearly defined. There are four main steps – search, insert, delete and replace the item. Other operations are complementary and are fairly rare. The presence of strong and well-defined structure of operations simplifies the problem of protecting databases. In most cases, hackers prefer to crack the protection of the computer system at the operating system and access the database files through the operating system. However, if you use a database that does not have sufficiently robust defense mechanisms, or poorly tested version of the database that contains the error, or if the security policy database administrator mistakes had been made, it is quite possible to overcome the hacker protection, implemented at the level of the DBMS. (more…)