Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Ironically, the security hole that allowed the hackers to obtain access was not through the tracker itself, but through The Pirate Bay's official blog.
"Some people (and yes, we know who) found a security hole on our web site (in fact, actually in this blog)," said BKP on The Pirate Bay blog. "They have got a copy of the user database. That is, your username and passwords.""
The rise of web 2.0 and user-generated content gave criminals other channels, or vectors, of attack, it found. For example, postings in blogs and forums that contain links to images or other content could unwittingly infect a user. The study also found that gangs were able to hijack web servers, effectively taking over and infecting all of the web pages hosted on the computer. In a test, the researchers' computer was infected with 50 different pieces of malware by visiting a web page hosted on a hijacked server. The firm [i. e. Google] is now in the process of mapping the malware threat."
The original article at www.homelandsecurity.alabama.gov/tap/anti-gov_grp
A disturbing sign of things to come or a hilarious display of government incompetence? Only time will tell."