Feeds

Hacktivists own Myanmar govt. site

Burmese Daze

  • alert
  • submit to reddit

The Power of One Infographic

Engineers were still trying on Thursday to restore control of the Myanmar (Burma) government Web site after hacktivists brought it down, the Associated Press reports.

An officer of the Directorate of Defence Services Intelligence told the wire service that Myanmar.com had been taken down on Wednesday, but declined to elaborate. He spoke on condition of anonymity.

The Web site articulates the military government's side in a propaganda war dominated by overseas supporters of the opposition, led by Nobel Peace Bribe winner Aung San Suu Kyi whose party won general elections in 1990 but has not been permitted to assume office. Aung has since spent considerable time under house arrest and encumbered by various gag orders, a situation which has outraged critics abroad.

Only government bureaux and a handful of businesses in Myanmar have access to the Web, and just a few hundred domestic users have e-mail, the AP notes.

The military government, naturally, controls all local media, and punishes such dangerous social deviants as scholars, writers and journalists rather severely whenever they diverge from the officially-approved script. Thus all material critical of Myanmar's regime is published or hosted overseas.

During last weekend's Defcon 08 convention in Las Vegas we noticed there was a general buzz about the need for talented hackers to apply their skills to something useful, like an increase in hactivism. We wonder if this could be the start of something good... ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.