I doubt it will be long until they get taken down, some personal info (which was confirmed to be right on the lulzec twitter) was already posted here: http://lulzsecexposed.blogspot.com/
Abit like the infamous Scipy.
Cute and fuzzy on the inside at times humble, but a tard eating living 'im gonna just have fun while you are crying no matter what' kind of type.. I love it
Well, they stirred up a hornet's nest when they DOS'ed the CIA website.
Although I don't agree with their method, I'm quite shocked at how they managed to break some of their targets. The Citibank site was compromised by an SQL injection (inserting part of an SQL query into a web form or address to extract sensitive data from a database or bypass login), which is a basic attack vector that every self-respecting website or database developer should secure. The way they're just DOS'ing (Denial of Service - basically just flooding a server with too many requests) everything is also disturbing, because it's not too hard to configure a web server against simpler DOS attacks.
Well, if LulSec didn't bring this lack of security to light, who would?
If the companies in question weren't prepared now then they should be by the time this all blows over. Additionally, it's a wake up call to other companies and agencies who have valuable data but have lackluster security.
It's like they said and also what my original point behind my first post in this topic was: They bring it to light and brag about their achievements, others just take what they want and leave quietly.
What's more dangerous, publishing the usernames and passwords or not?
If they didn't claim to have them, noone would probably know, and it could be abused very badly. By releasing them, they're making everyone aware of the fact and gives people a chance to change their passwords.