<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d7134549\x26blogName\x3dJonathan\x27s+Liverstone\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://liverstone.blogspot.com/search\x26blogLocale\x3den_GB\x26v\x3d2\x26homepageUrl\x3dhttp://liverstone.blogspot.com/\x26vt\x3d-3181951560992862409', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
Jonathan's Liverstone

A place of Bile & other Humours.

BlogRoll


Telecom and the 027 Hack.  

Telecom's response to the 027 hack has been somewhere between arrogant and ignorant.
It surely falls far short of the responsible behaviour that one would expect of such a major player in telecommunications in this country.

FIRST, they left the 027 mailboxes exposed to a well know exploit, presumably hoping that no-one would find it ... security by obscurity never works.

THEN they didn't do anything about it when the "hacker" approached them and told them of the weakness.
This "hacker" then demonstrated his immaturity by the way he subsequently publicized his discovery; accessing high profile mailboxes without permission. (Appropriate "white-hat" behaviour would be to demonstrate the exploit on mailboxes where you have the owner's permission).

THEN they involve the police in laying charges, when really the crime of not adequately protecting customers' information was committed by Telecom. (I wonder how the Privacy Act applies here?)

AND NOW: it is reported that they have blocked access by their customers to the site where there is information about the exploit.
Like that's going to be of value! It won't stop someone from another ISP from accessing the information, and the only motivation can be to stop the dull-witted would-be hacker from gaining access to the web-site, and to stop customers from seeing how inept they have been in this matter. Not to mention the pong of corporate censorship.

Does Telecom have a Security Officer?
Where is his response? He must be feeling pretty stupid at the moment.
Has the exploit been closed yet? It's not *that* hard; restricting access from offshore sources is a good interim measure.
What else is he NOT doing?

1 Comments:

What's the website they blocked?


Disclaimer: (I stole this from Internal Affairs.)
All links and references to other websites, organisations or people not within my control are provided for the user's convenience only, and should not be taken as endorsement of those websites, or of the information contained in those websites, nor of organisations or people referred to. I also do not implicitly or impliedly endorse any website, organisation or people who have off-site links to this website.
... But then again; I only link to sites 'cos I see something there that's worth linking to.