Several blogs and twitter feeds of the Financial Times were put in jeopardy by hackers on May 17, Friday.

The "Syrian Electronic Army", a group of hackers and avowed supporters of Syrian President Bashar al-Assad, already owned up responsibility to the action.

This group of online activists is also responsible for the repeated attacks on Western media companies in the past.

Headlines of stories in the FT Web site were replaced with ""Hacked By Syrian Electronic Army" while Twitter feed messages contained "Do you want to know the reality of the Syrian Rebels?" One message labelled the Syrian rebel group Jabhat al-Nusra as terrorists followed by a link to a video showing prisoners being shot at the back of the head while kneeling.

The hackers allegedly tried to jeopardise FT's system for the last 24 hours.

The infiltration is the group's latest attempt in a string of high impact attacks against media entities. Prior to this, the group had targeted BBC's weather service Twitter account and the accounts of Human Rights Watch and France 24, a French news service.

It also took over the online systems of the Associated Press, The Guardian, BBC and the satirical newspaper The Onion.

Tech experts at The Onion identified the process of infiltration in their system as having followed a "multistage phishing expedition" - an attack that enabled the hackers to gain control of the social networking pages of the magazine. The process employed with FT is yet to be identified by the experts.

On Twitter's part, there is reportedly a way to curb if not totally eliminate hacking incidents through a two-factor authentication system. "Twitter recently announced plans to introduce two-factor authentication which is a big step forward from a security perspective. As this particular event shows human element is often the weakest link in any security solution," director of research at Arbor Networks Dan Holden said.

"Given similar attacks in recent weeks against the Guardian in the UK and The Onion in US these attacks seem to be very targeted. Organisations should put processes in place to ensure that their staff are trained on best practices and have the support and training needed to allow them to follow these practices easily during their normal working routine. Ideally network monitoring solutions should also be put in place to alert an organisation when a user system connects to a known bad actor on the internet as this may indicate a compromise, allowing remedial action to be taken before there is any business impact," he added.