Feeds

Philippine govt to hacktivists: Please don't hit your shiny new site

New hi-tech anti-hack plan launched into action

Top three mobile application threats

The Philippine government has come up with a novel approach to combatting the hacktivist threat: ask any cyber ne’er-do-wells politely but firmly to stay away from their web sites.

The call came on Monday at a press briefing to discuss the government’s new open data initiative.

Open Data Philippines was launched by president Aquino’s administration in an attempt to "institutionalise open, transparent, accountable and participatory governance by providing Filipinos with accessible, understandable and shareable government data”, according to a video explaining the launch.

However, possibly fearing a public backlash, presidential spokesman Edwin Lacierda appealed to hackers not to attack the site.

“We would like to ask those who would like to deface this Open Data Philippines, it is a step towards transparency and accountability … Sana huwag naman (We hope they won’t attack it),” he said, according to a presidential press release.

Local site Rappler, who attended the press briefing, had more:

“Open Data is your data. This is the public’s data about you, so I don’t think it’s in the interest of the Filipinos to damage the information that we have,” Lacierda apparently said.

“This instrument is intended to make more intelligent and more participative and to make the Filipino public partners in governance.”

The government’s fears of hacktivist retribution are partially justified.

In November last year several federal and local government web sites were defaced by hackers claiming affiliation with Anonymous, in an attempt to garner support for a demonstration against lawmakers' alleged misuse of public money.

A few months previously an Anonymous hacker published what he claimed to be three telephone numbers belonging to Aquino in a bid to urge voters to confront their leader directly.

Local hacktivists have also taken to the internet to wage war on Malaysian sites after a bloody territorial battle in the east Malaysian state of Sabah, and to deface Chinese sites after a dispute between the countries in the South China Sea. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.