Feeds

Pranksters infiltrate live Macworld feed

Blasphemy on Jobsian high holy day

Beginner's guide to SSL certificates

As unfounded as they may be, reports of Steve Jobs's demise have spread to a live feed of Macworld Expo provided by Apple gossip site MacRumors after griefers managed to breach the website's security.

The micro-blogging feed at Macrumorslive.com appeared banal enough through the first 23 minutes of Monday's Macworld Expo keynote, as Apple VP Phil Schiller walked attendees through one of the most uninspiring presentations in years. Then the following bombshell was inexplicably dropped:

"STEVE JOBS JUST DIED :"

The micro-blogging feed continued apace with details about new bells and whistles in iPhoto. Finally, three minutes later, the feed clarified:

"Retraction on Steve Jobs comment ... we don't know how that got in our feed. Steve did not die."

That prompted a rejoinder from the griefers that "Oh wait, sorry, Steve did die. Our condolences." They went on to claim affiliation with 4Chan, a website whose anonymous participants have discussed a number of high-profile online hijinks, including attacks on the Church of Scientology and the breach of a Yahoo email account belonging to vice-presidential candidate Sarah Palin.

Screenshot of Macrumorslive feed

"Our MacRumorsLive keynote coverage was hacked today, inserting inappropriate content into the text and photo feeds," an item on Macrumors.com read. "We apologize for the inconvenience and are working to restore our services." At time of writing, Macrumorslive.com was unreachable.

It remains unclear how the perpetrators were able to breach the Macrumorslive. Some bloggers reported that the site's passwords had been circulating on 4Chan for a day prior to the hack, but that couldn't immediately be confirmed.

What is clear is that the breach is a major embarrassment for MacRumors, which surely counts the keynote of Macworld Expo to be the highest of holy days. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.