Feeds

Potty mouth hackers pwn TechCrunch (again)

This time it's personal

Security for virtualized datacentres

TechCrunch has been hit by potty-mouth hackers for the second time in 24 hours.

The second hack (image below) features a foul-mouth rant aimed against site founder Michael Arrington. It also includes a link to the same online smut and warez-peddling Torrents site "promoted" via the previous attack.

Arrington, the crackers brag, should be grateful they didn't delete setup and registrations on TechCrunch's back end database when they attacked the site.

Tech_blog_redefaced

TechCrunch re-defaced

TechCrunch admitted on Tuesday that an exploit it was attempting to identify was behind the earlier Monday night hack, suggesting the same security loophole remains open and was used in the latest assault.

The motives behind the attacks, much less the miscreants behind them, remain unclear. However, the timing just before Apple's much hyped iTablet launch in San Francisco must be causing all sorts of consternation at the US-based tech blog.

TechCrunch was back up and running on Wednesday morning, well in time for the site to cover Moses Steve Jobs bringing the iTablets down from Mount Cupertino. ®

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.