WikiLeaks suffered a cyber-attack this morning from white hat collective OurMine, which posted a message on the site's homepage saying, "It's OurMine (security group). Don't worry we are just testing your... blablalblab oh wait, this is not a security test! WikiLeaks remember when you challenged us to hack you?
"Anonymous, remember when you tried to dox us with fake information for attacking wikileaks?
"There we go! One group beat you all! #WikileaksHack let's get it trending on twitter!"
The shop-window impact may have been embarrassing for WikiLeaks, but the attack itself was rudimentary, if highly effective in PR terms. According to a report on Hack News this morning, this was a simple DNS poisoning attack.
Anonymous responded to OurMine's goading by describing the attack as a "fake defacement", having previously shared personal information of claimed members of OurMine.
This latest attack by OurMine - which has leaked media companies' IP and last year compromised the social feeds of Facebook's Mark Zuckerberg and Google's Sundar Pichai, among others - reveals an uncomfortable truth about digital security in a networked, socially sensitive world.
Such apparent security "breaches" are often extremely low tech, but high value in news terms.
This makes them difficult to counter, except by ensuring that real domain security is absolute and that core services are protected, while trying to anticipate what attacks on the harder-to-police perimeter may have on customer services and public reputation.
In fear of future shortage - or in preparation for its own electric car project?
New Spectre microcode patches released by Intel to fix security flaws in Skylake, Kaby Lake and Coffee Lake CPUs
But if you're running anything older you'll have to wait
Powered by servers based on Qualcomm's scalable 48-core Centriq 2400 10nm CPUs
Malware has been in circulation for more than a year