Feeds

Symantec HackIsWack contest packs in

Peace out, etc

Internet Security Threat Report 2014

Symantec's hapless HackIsWack cybercrime rap competition came to a close on Thursday, with 180 entries.

The rap competition had the worthwhile aim of raising cybercrime awareness, but will chiefly be remembered for the farcical antics on its dedicated macro-site, hackiswack.com.

Interested parties quickly discovered that cross-site scripting problems on the site made it possible to rickroll surfers to deliver content from third-party sites. Symantec moved to fix the problem, only for security researchers to discover shortcomings in the fix that allowed yet more rickrolling mischief, specifically Beaker from the Muppets singing internet-annoyance anthem Never Gonna Give You Up.

The rickrolling cross-site scripting bug was just the most obvious of the site's flaws. Other problems included the caching of potentially sensitive data and upload security problems, as explained here.

No real harm came of any of this, but nonetheless surfers are entitled to expect higher standards of website security from Symantec-branded sites than from your average mom and pop website. Symantec wound up looking more than a little clueless rather than at all down with the kids.

In response to questions from El Reg, Symantec declined to name the guilty party who developed the site, doing nothing to quell speculation that rapper Snoop Dogg, who serves as a spokesman for HackisWack, also coded the site.

"Ultimately, responsibility for the microsite falls on Symantec and we have addressed the issue," it said.

The contest itself was open to US residents only, who were invited to upload a two-minute video on the theme of cybercrime. The winner will secure an all-expense paid trip to LA for two to see a Snoop Dogg concert, along with a laptop running Norton Internet Security. ®

Internet Security Threat Report 2014

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.