LulzSec Members Plead Guilty to DDoS Attacks
Two members are still face charges of posting stolen data on public sites; two other LulzSec members plead innocent to all charges in Britain's Southwark Crown Court, reports say.
Two members of the LulzSec hacking group Monday pleaded guilty to attacking and disabling the Websites of several large organizations, including Central Intelligence Agency, Sony, Fox Entertainment Group, the Arizona State Police and Britain's Serious Organized Crime Agency (SOCA).
Ryan Cleary of Wickford, England, pleaded guilty to six of eight charges against him, while Davis, of Lerwick, England, admitted to two of the four charges against him.
The duo entered the guilty pleas in Britain's Southwark Crown Court today, according to Bloomberg Businessweek.
Both Cleary and Davis still face charges of posting unlawfully obtained data on sites such as PasteBin and Pirate Bay.
Two other alleged members of the group, Ryan Ackroyd and an unnamed 17-year-old individual, pleaded not guilty to all charges filed against them, Bloomberg and several British newspapers reported today.
All four are scheduled to be tried in April 2013.
Cleary was arrested in Britain last June in connection with a spate of high profile distributed denial of service attacks against numerous targets in the U.S and Britain.
He was initially charged with using a botnet to launch DDOS attacks against SOCA last year. He was also charged with attacking the International Federation of the Phonographic Industry (IFPI) site and the British Phonographic Industry (BPI) website in 2010.
Cleary also faces several charges in the United States. He was indicted by a federal grand jury earlier this month for DDoS attacks against Sony, Fox and other organizations.
U.S. authorities have said they will explore extradition options after the legal proceedings against Cleary in the United Kingdom are completed.
Cleary, who has Asperger's Syndrome, has been in jail since his arrest last June.
Davis, identified by police as alleged LulzSec spokesman "Topiary" was arrested in the Shetland Islands a few weeks after Cleary's arrest.
Police claimed that after Davis' arrest, they found incriminating evidence in a computer seized from his home.
The computer allegedly stored details of numerous pre-paid cards in false names, names and passwords of 750,000 random people, and drafts of a fake news story about media baron Rupert Murdoch's death which were used in attacks against Murdoch's News International publishing company.
LulzSec initially downplayed Cleary's arrest and maintained that police had got the wrong man.
A few weeks later, members of the splinter organization of the Anonymous hacking collective, issued a defiant statement vowing to carry on despite the arrests.
Several other members of LulzSec were arrested earlier this year based on information provided by Hector Monsegur, also known as 'Sabu,' a New York-based hacker who was identified by police as the leader of the group.
Monsegur, was quietly arrested by police last year, pleaded guility to multiple charges against him and agreed to work with the FBI in identifying other members of LulzSec and Anonymous.
While the buzz around big data analysis is at a peak, there is less discussion about how to get the necessary data into the systems in the first place, which can involve the cumbersome task of setting up and maintaining a number of data processing pipelines.
Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.
Smartphone sales increased substantially in the second quarter of 2015, but the rate of growth continued to slow, fueling concerns that the market has started to become saturated, according to a study released today by Juniper Research.
Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.