Microsoft appears to have had its Indian web store broken into and user login credentials stolen by Chinese hackers. Tech site WP Sauce reported on Sunday that the group, which goes by the name Evil Shadow Team, managed to deface the web site, posting an image of a V for Vendetta mask and the message: “Unsafe system will be …
So not so much MS have been hacked as company providing service to MS has been hacked.
I was thinking that it's not very likely that MS would have been hacked since one thing that they are very good at is their own web security, due to the thousands of hack attempts per second that they see.
You must be very well informed about "the thousands of hack attempts per second that they see".
And yet again
Forget the ethics of hacking for a moment, how many of you would accept that your banker simply stored your money on the floor just behind the front door.
Will be interesting to hear Microsoft's excuse.
I'm not sure what your comparison is? Why is a site being compromised like a bake storing money on the floor?
In your example I'd have absolutely no problems with my bank doing that. Just as long as I can get to my money the very moment I need it. And since most of that comes out of an ATM....
Hackers, you say?
Surely then, the article is missing the now standard 'the group has links to Anonymous' type of comment? Certainly, its been a long time since a new hacking group has not been linked to them in some particularly tenuous fashion (eg. we don't know who these guys are, either!)
"Hacked by Chinese"
That phrase makes me a little nostalgic.
Even Sony stored it's passwords as hashes, so surely this deserves more than 3 months of constant press coverage....
- Updated HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
- Peak Apple: Mountain of 80 MILLION 'Air' iPhone 6s ordered
- Students hack Tesla Model S, make all its doors pop open IN MOTION
- BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
- PROOF the Apple iPhone 6 rumor mill hype-gasm has reached its logical conclusion