fbpx

Anonymous Hacked MIT on Anniversary of Aaron Swartz Suicide

P { margin-bottom: 0.08in; }A:link { }

http://www.ehacking.net/2014/01/anonymous-hacked-mit-on-anniversary-of.html
WE NEVER FORGET, WE NEVER SURRENDER,
EXPECT US
” You can see the tag line appearing (at the time of
writing) on MIT subdomain (cogen.mit.edu) along with the well known
symbol of anonymous. If you are not an active Internet user then you
might find this weird but if you know something about hacking then
you might know the anonymous hackers and their symbol.













Yes, this particular domain has been
hacked and defaced by some hacker and they have written their message
on the domain name. “Remember THE DAY WE FIGHT BACK” this message
pointing towards Aaron Swartz, who has actively participated against
SOPA and PIPA censorship laws.






Not long after Reddit Co-founder and
activist Aaron Swartz submitted suicide on January 11, 2013,
Anonymous hackers defaced the site of the Massachusetts Institute of
Technology (MIT). Right away, one year after his expiration.






The defacement is the part of Operation
Last Resort (#OPLASTRESORT), the particular campaign begun soon there
after Swartz’s dying. 
MIT Domain

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...