Lulz Sec also posted online what the group claimed were user IDs and passwords for the PBS MySQL database, as well as login credentials for affiliate stations, PBS reporters, Frontline staff, PBS staff and administrators, and a map of the PBS internal network. It's not clear if any other data was taken or if the malicious hackers simply wanted to embarrass the network.
This is not the first time Lulz Sec has caused havoc online. The group recently exposed a database from a and also in mid-May. Lulz Sec isn't finished with its shenanigans either. The group is promising more attacks against Sony sites within the next 24 hours in an operation it is calling Sownage (Sony + Ownage).
Corporations and other large organizations are finding themselves increasingly vulnerable to malicious hacks from pranksters or serious criminals. Defense contractor recently revealed it was the target of a cyberattack, but claimed it had repelled the intruders and protected its data.
The Lockheed Martin attack was the result of a previous intrusion against that compromised the company's SecurID two-factor authentication product.
A March break-in against , the world's biggest email marketing firm, exposed the customer names and email addresses for dozens of high profile companies such as JPMorgan Chase, Capital One, US Bank, Citigroup, and Walgreens.
In late April, malicious hackers stole a few megabytes of data from the Oakridge National Laboratory, funded by the U.S. Department of Energy. Finally, the now infamous Sony , which shut down the online gaming network for nearly four weeks, still has the company reeling from a lot of bad press and disgruntled users.
Connect with Ian Paul ( ) and on Twitter for the latest tech news and analysis.