Feeds

Shock jock blames Britain for hack attack

Savage site ravaged - entire population to blame

Securing Web Applications Made Simple and Scalable

Controversial shock jock Michael Savage was hit by a hacking attack last weekend that forced his site offline for around an hour on Saturday.

Savage, who has threatened to sue former Home Secretary Jacqui Smith for defamation over an order banning him from entering the UK, suggests Britain might be to blame for orchestrating the attack on his site, WorldNetDaily reports.

He attributes the timing of his attack to his criticism of the release of convicted Lockerbie bomber Abdelbaset Ali Al-Megrahi, who received a hero's welcome on his return to Libya last week.

"Why on the day of the worldwide furor over the release of the Lockerbie bomber by [British Prime Minister] Gordon Brown would Michael Savage's website be hacked?" Savage said, WorldNetDaily reports. "We cannot say who did this, but would it not be a possibility that the Brits themselves ordered this hack attack?"

WorldNetDaily reports that unidentified scamps broke in through a feedback portal before damaging Savage's site. Quite who pulled off the attack is unclear, as is often the case with hacking attacks, which these days are most often launched via compromised proxies. ®

Bootnote

The circumstances of Al-Megrahi's release have been widely criticised on both sides of the Atlantic, sparking some talk in the US of a ban in Scottish goods. Wags north of the border have responded to threats with a long list of Scottish inventions the US might care to ban - including pneumatic tyres, TVs and telephones - that can be found on the Boycott Scotland site here.

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.