Feeds

Teenager finds virus, acclaimed world-saving genius

The accidental hero

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Last week the UK press fell over itself to announce that an 18 year-old British computer studies student had saved the World.

Matthew Hillman, from the Isle of Wight, was first hailed a genius in a Sun exclusive but news of his stupendous achievement could not be contained and he was soon lionised in the Telegraph and acclaimed by the BBC.

Reading the articles you'd get the idea the young lad was a genius on the par with Alan Turing. So what had he done?

Invented a cure for cancer?

Err, no.

Thought up a way of saving the rain forests?

Emm, not that either.

So what had he done you wonder. Well he happened upon some malicious script during an Internet Relay Chat session, figures out around 400 sites might be affected, and then told the authorities about it. And, err, that's it.

For this he was hailed as a genius who has saved businesses millions, despite the fact that this is an everyday occurrence.

There's little to differentiate the story other than it was picked up by a local news agency and given the full treatment in The Sun, where it was obviously a slow news day.

We don't really blame it for that but The Telegraph's Stewart Payne and the BBC, which referred to a virus it called the "Trojan horse" throughout its uncredited piece, really ought to know better. Poor form, chaps. ®

External Links

COMPUTER LAD, 18, SAVES THE WORLD (The Sun)
Student spotted 'Trojan horse' hacker (BBC)
Alert student prevents internet virus chaos(The Telegraph)

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.