Feeds

Anonymous tweets for hack targets

Who do we go after next? asks V-masqued mob

Secure remote control for conventional and virtual desktops

Hacktivist guild Anonymous has taken to Twitter to ask followers for tips on who the group should attack next.

Still reeling over the arrest of Megaupload mogul Kim Dotcom, Anonymous posted the following tweet:

Anon tweet

After several people suggested the group throws punches at social network sites, it responded:

“Lulz at people saying we would take down Twitter, FaceBook,and YouTube… Why would Anon take down how we send our messages?”

Anonymous has vowed to keep the recent flurry of attacks a regular occurrence until Dotcom is released.

“Support TBP, Torrents, Magnets, Megaupload and its alternatives. Support file-sharing. Legal or not. It is our right,” tweets Sabu, a well-known Anonymous hacker.

The war goes on. ®

The essential guide to IT transformation

More from The Register

next story
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Apple to build WORLD'S BIGGEST iStore in Dubai
It's not the size of your shiny-shiny...
Just in case? Unverified 'supersize me' iPhone 6 pics in sneak leak peek
Is bigger necessarily better for the fruity firm's flagship phone?
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?