Microsoft joins list of recently hacked companies
The software giant said it was hit with a similar hack to that used against Facebook and Apple
IDG News Service - Microsoft has disclosed that it recently fell victim to the same type of cyberattack that targeted Apple and Facebook.
"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations," the company said on its Security Response Center website Friday.
"We have no evidence of customer data being affected and our investigation is ongoing," it said.
Apple and Facebook were both targeted via a vulnerability in Oracle's Java platform, and Microsoft said Friday it was hit by a similar attack.
"This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," it said.
The Times, the Journal and Apple each pointed at China as the source of the attacks. Twitter didn't say where it thought the attacks originated but urged 250,000 of its users to change their passwords.
China has denied involvement in the attacks.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Malware and Vulnerabilities White Papers | Webcasts