Feeds

Cyber alerts are phishing magnet, says Senator

"Put that light out!"

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Senator Chuck Schumer has described the Department of Homeland Security's new 'cyber alerts' as a magnet for phishing expeditions and virus writers.

On Wednesday the Department sprang into action and issued its first Cyber Alert - warning users of the "SCObig" virus that had been causing havoc with email systems since Sunday afternoon.

"Details about this new variant are still emerging, but it has been validated as spreading," the Homeland Security boffins told us yesterday, as most users were entered the fourth day of cleaning up after SCObig.

Alert may not be the right word for this class of information. Our dictionary defines alert as "to notify of approaching danger or action", rather than issue a post-facto reminder 72 hours after the event.

If you build it, they will come, said Schumer:

"What DHS did today was essentially challenge computer hackers all over the world to put a virus into an email that mimics the DHS email warnings," said the Senator. "If I were a betting man, I'd put a few dollars down that the next virus that clogs computer networks is going to be transmitted through an email that looks like one of these DHS email alerts. This flaw is exacerbated by the fact that without any kind of requirement mandating ISPs and other companies to report the discovery of viruses, these warnings will likely come after a virus has stated spreading out of control."

The ARP wardens over at the Department hit back, arguing that the alerts were cryptographically signed.

Senator has adopted populist tech causes before, to a mixed reception. He demanded that Microsoft postpone the launch of Windows XP until he was satisfied that that third-party utility vendors were given equal billing, and backed an ill-advised "opt-out" list for junk email. He's made better calls with consumer cellphone issues, introducing a "Bill of Rights" for long-suffering subscribers, and conducting research into hidden charges on phone bills. A survey of plans in his home state New York showed that carriers' true bills ranged from $6.47 (Nextel) to $19.81 (Verizon) more per month than advertised. ®

External Links

Schumer slams ARP patrol
"... validated as spreading" [Homeland Security]

Related Stories

Popup Senator debuts cellphone rights bill
US Senator aims to kill Win XP launch
Senator 'Cheesy Chuck' Schumer phears the virus
Michigan law chief slams 'bogus' anti- spam group
Clinton Admin goes out in a blaze of cyber-terror

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.