WikiLeaks suffered a cyber-attack this morning from white hat collective OurMine, which posted a message on the site's homepage saying, "It's OurMine (security group). Don't worry we are just testing your... blablalblab oh wait, this is not a security test! WikiLeaks remember when you challenged us to hack you?
"Anonymous, remember when you tried to dox us with fake information for attacking wikileaks?
"There we go! One group beat you all! #WikileaksHack let's get it trending on twitter!"
The shop-window impact may have been embarrassing for WikiLeaks, but the attack itself was rudimentary, if highly effective in PR terms. According to a report on Hack News this morning, this was a simple DNS poisoning attack.
Anonymous responded to OurMine's goading by describing the attack as a "fake defacement", having previously shared personal information of claimed members of OurMine.
This latest attack by OurMine - which has leaked media companies' IP and last year compromised the social feeds of Facebook's Mark Zuckerberg and Google's Sundar Pichai, among others - reveals an uncomfortable truth about digital security in a networked, socially sensitive world.
Such apparent security "breaches" are often extremely low tech, but high value in news terms.
This makes them difficult to counter, except by ensuring that real domain security is absolute and that core services are protected, while trying to anticipate what attacks on the harder-to-police perimeter may have on customer services and public reputation.
Human Body Communication system is 'more secure than a wireless network' while consuming less power
Denham reveals UKIP is one of four organisations appealing its notice to the Information Rights Tribunal
Paras Jha and Josiah White originally identified by security journalist Brian Krebs
Nintendo plans to manufacture up to 30 million Switch consoles next year