Feeds

Anonymous attacks Tunisia: Zine El Abidine Ben Ali offline

Anarchists lurch about firing DDoS cannon incontinently

Seven Steps to Software Security

A portion of 4Chan's denizens have taken it upon themselves to attack Tunisian government websites.

The attack follows a decision by the Tunisian government to block access to WikiLeaks cables. Given the widespread use of censorware technology in Arab nations, we strongly suspect the Tunisian government is not alone in making this move, but it seems to have become the focus of a DDoS assault, which unsurprisingly floored targeted websites including those of Tunisian president Zine El Abidine Ben Ali and the government's official website. Net security firm Sophos reports.

In a statement, members of the Anonymous collective said the attack is in response to censorship by the Arab nation, which seems to come as something of a surprise to those behind the attack, if not to the wider world. We rather suspect the more informed members of the loosely banded Anonymous collective would be more aware of the country's mediocre (but not especially dreadful, to be fair) human rights record.

Attacking the brochureware websites of countries that make little use of internet access to run their business makes little or no sense. It's an empty gesture, at best, and makes those running such attacks look about as effective as the People's Front for the Liberation of Judea, at worst.

Those concerned about press freedoms and censorship in Tunisia or the wider region would do a lot better to lend their support to Reporters Without Borders or the Open Net Initiative rather than download packet-flooding tools.

The attacks against Tunisian government websites are the latest of a series of assaults against organisations seen as hostile to WikiLeaks – primarily financial firms such as Mastercard and PayPal that have suspended payment facilities for the whistleblower website in response to the row over its release of leaked US diplomatic cables. Participants in the attack are invited to use the LOIC packet-flooding tool established by Anonymous. Anecdotal evidence suggests that some of the more militant Anonymous members are using botnets of compromised machines to increase the potency of attacks. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.