December 29, 2012
Hackers Steals 36,000 Individual Details from US Army Database
Do you like this story?
Earlier this month, unknown hackers managed to gain illegal access to the details of around 36,000 individuals who were somehow connected to the US Army command center formerly located at Fort Monmouth.
According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) personnel were accessed by the hackers.
Nongovernmental personnel and Fort Monmouth visitors are also affected by the breach.
The hack, discovered on December 6, exposed names, dates of birth, social security numbers and salaries, Army representatives said. After the incident, the targeted databases have been taken offline.
CECOM and C4ISR were relocated from Fort Monmouth to Aberdeen Proving Ground back in September 2011.
The affected individuals are being offered one year of free credit monitoring services.
According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) personnel were accessed by the hackers.
Nongovernmental personnel and Fort Monmouth visitors are also affected by the breach.
The hack, discovered on December 6, exposed names, dates of birth, social security numbers and salaries, Army representatives said. After the incident, the targeted databases have been taken offline.
CECOM and C4ISR were relocated from Fort Monmouth to Aberdeen Proving Ground back in September 2011.
The affected individuals are being offered one year of free credit monitoring services.
About the Author:
Ifeanyi Emeka is the founder of this blog and also writes for Tech Forked. He is passionate about tech stuffs and loves customizing blogger themes.
Popular This Week
Hackers Steals 36,000 Individual Details from US Army Database
2012-12-29T10:52:00Z
dfgdfg
Data-Leak|Hackers|Security|US Army|
Subscribe to:
Post Comments (Atom)