Acer server in Europe reportedly breached
Pakastani hacker group claims it accessed personal data on 40,000 people
Computerworld - Hacking group Pakistan Cyber Army on Friday claimed it had broken into an Acer server in Europe and stolen personal data on about 40,000 people.
The group claimed that it also stole several pieces of source code that were stored on the compromised computer.
News of the breach was first reported today by The Hacker News (THN), which published screenshots showing samples of the allegedly compromised data, including names, email addresses, phone numbers and other information stored on the server.
THN said the Pakistan Cyber Army (PCA) contacted it earlier today to inform it of the attack on the Acer system and the theft of personal data.
Lisa Emard, director of media relations for Acer America, said the company's U.S. operations have no information on the breach. The company is trying to get a response to the PCA claims from its European officials, she added.
The breach comes as Acer, the second-largest manufacturer of laptop computers in the world, faces increased scrutiny of its financial reporting practices.
On Thursday, Acer's stock price tumbled precipitously on the Taiwan stock exchange after an audit uncovered irregularities in the company's inventory and audit receivables information, according to a Bloomberg report.
The findings will result in a one-time $150 million write-off for Acer, Bloomberg said.
A brief statement posted on Acer's U.S. site said that company Chairman and CEO J.T. Wang would take responsibility for the charge "by relinquishing total remuneration from his position as director of the company board, as well as employee bonus of 2010."
It's unclear if the hacking attack had anything to do with the company's financial woes.
Acer is just one of several large companies that have been compromised recently. Others in the news as a result of similar break-ins just this past week include Lockheed Martin, L-3 Communications and Sony.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!