UPDATED: ABC confirms TV program website hack
- 27 February, 2013 16:57
The Australian Broadcasting Corporation (ABC) has confirmed that a website related to the 2010 TV program Making Australia Happy was breached with 49,500 audience usernames and hashed versions of passwords leaked.
A hacker going by the Twitter handle of Phr0zenMyst claimed ownership of the attack and said it was a response to the recent appearance on ABC's Lateline program of right-wing Dutch politician Geert Wilders.
"The aim of the hack was to hurt ABC for allowing Wilders to spread hate, apologies for any harm caused to others," tweeted PhrOzenMyst yesterday.
As soon as the company was made aware of this breach, the website was shut down.
An ABC spokeswoman confirmed that it has now written to the 49,500 people that were affected.
"The ABC has sincerely apologised for the incident and assured the users of the Making Australia Happy site that immediate action has been taken to contain the breach and a review of the safeguards is underway," she said.
The spokeswoman added that some reports about the hack were incorrect.
"There was a survey on the site that was designed to measure how happy people are. The only information that was hacked is the information users provided to register for the website. Responses that users gave to the survey have not been exposed."
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Clearing the Clouds for Midmarket Businesses
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear course to the cloud isn’t always easy. In this paper, we aim to clear the clouds. We examine different cloud computing models, discuss the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.