Feeds

Palestinian hackers deface Jewish Chronicle

Hacktivists protest Gaza blockade

Intelligent flash storage arrays

The Jewish Chronicle website was defaced over the weekend by hackers calling themselves the "Palestinian Mujaheeds" who posted a rant against Israel's blockade of the Gaza Strip.

Hackers posted an image of the Palestinian flag alongside diatribes against Israeli security policy in both English and Turkish. The hacked front page of the site (www.thejc.com) also attempted to play an MP3 file, net security firm Sophos reports.

The website was taken offline for repairs following the attack on Sunday but returned on Monday morning with a story on the attack, downplaying the significance of the admitted breach.

"Only thejc.com site was affected. None of our numerous sister servers handling our archives, e-paper, social and personal, debating and MSFL sport were infiltrated," the paper reports.

Editor Stephen Pollard said: "Only those without the confidence to win an argument resort to such tactics. And it was a pretty self-defeating attempt to silence us. Our site was down for a few hours, but as a result we will get more readers than ever before."

The Jewish Chronicle, which is based in London, is the world's longest-running Jewish newspaper.

Defacers using the same Palestinian Mujaheeds nickname also hacked an Israeli weather website, www.israelweather.co.il, posting their name on parts of the site that would normally display weather satellite images.

Defacing websites with political messages has gone on for years. Previous examples include the hack of a US military website, which was defaced to display an image of a Palestinian protestor in front of an Israeli tank, in January 2009.

More recently Twitter and Chinese search engine Baidu were the victims of a DNS hijacking by the "Iranian Cyber Army". Surfers visiting the sites were forwarded to a third-party site protesting against Western cyberactivism following last year's disputed Iranian elections. ®

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.