Feeds

CNN 'tech analyst' on NAKED CELEBS: WHO IS this mystery '4chan' PERSON?

Ex-spurt also advises use of 'pa$$word'

Secure remote control for conventional and virtual desktops

Vid "If your password is password, change the 's' to a dollar sign." That's the advice from US news network CNN's "technology analyst" Brett Larson, who also thinks that 4chan is some sysadmin bloke who knew how to "hack things" so he could leak saucy, private photos of Jennifer Lawrence and other female celebrities.

The confusion over anarchic message board 4chan starts with CNN's news presenter, who naively asks Larson:

Do we even know? Who is this 4chan person or website?

Larson, attempting to mask "waaaaah, naked babes" schoolboy giggles, offers up this insight:

He may - and I'm sure we're going to be able to get some more confirmation on this as the hours and minutes go on - he may have been just a system administrator who knew his way around and how to hack things.

It seems like this was not a real big effort but was more of a "I have these usernames, I know of this loophole, this security loophole, I'm just going to run this password app and see if I can get into these people's cloud-based account."

The CNN news presenter then asks Larson what people can do to prevent their online accounts from being hacked. The tech expert advises:

You absolutely have to have good passwords. You have to have passwords that aren't words ...

Like, if your password was literally "password", which is the most common password, change the "s" to a dollar sign*.

The Register understands that this entire CNN exchange is in fact a piece of satirical art expertly disguised as another moronic news broadcast. ®

* Here in the UK, people with the password "password" should no doubt change the "s" to a pound sign, which looks like this: pa££word.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.