What does it take to run a successful bug bounty program?
The group, New World Hacking, claims the DDoS attack exceeded 600 Gbps.
The hackers probed the system but didn't take control of it, the Wall Street Journal reports.
The data potentially exposed includes full contact information, passwords, birthdates, and credit card data.
The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.
And porn sites are now the top mobile infection vector, according to Blue Coat.
The hacker claims to have accessed Brennan's application for top secret security clearance, along with other sensitive data.
The company says it's investigating 'whether there is any truth whatsoever to this report by a competitor news organization.'
Ardit Ferizi is accused of providing ISIL with the personal information of approximately 1,351 U.S. military and government personnel.
The 25 profiles appear to be tied to the Iranian hacker group TG-2889.
The breach remained undetected for five months, according to the New York Times.
The researchers found that 'an inordinate number of proxy servers' used by the Angler Exploit Kit were on servers belonging to Limestone Networks.