Hacking Getting Out of Control Due to Lack of the Laws

By Ashley Caputo February 19, 2013

As we covered this morning, there was a strange hack of Burger Kings’ Twitter over the weekend where photos of its main rivalry’s’ logo, McDonald, were published. But this wasn’t the end of a series of unfortunate events for Twitter. Jeep’s Twitter account was hacked later in the day as well, where messages were published saying that the company has been sold to its main rivalry, General Motors’s (GM) Cadillac.

One of the tweets from the hacked Twitter account said that there will be no more Jeep production because “we caught our CEO doing this…” with a link to a picture of a man doing illegal drugs, sharing some similarities with a post from Burger King about its employees.

These two publicized attacks on major rivalry companies in the auto and franchise industry have made us wonder: who are these hackers trying to hurt?

Earlier this month, Twitter reported a scam that affected 250,000 users, where usernames, e-mail addresses, session tokens and encrypted/salted versions of their passwords were stolen. However, it seems that this scam wasn’t enough to damage Twitters’ reputation, so hackers took to stealing the account of companies that are known around the world in order to garner this type of attention.

The increased mobility usage as well as the BYOD trend has brought to light the sensitive issue of security, as data brokers seems to be constantly stealing personal information – such as credit cards, home addresses, school addresses, online purchases and Internet browsing activities. Yes, of course, when combined with the most recent Twitter scam, this incident further highlights how vital it is for companies to protect their security.

“The Burger King and Jeep hacks of the last few days are malicious pranks that fortunately were so absurd they did not damage the reputation of either company.  Reality is the number, sophistication and frequency of hacks and other types of cyber attacks is accelerating," said Peter Bernstein, senior editor at TechZone360. "They highlight the need for constant vigilance. The ability to alter a corporate website were relatively benign and inconvenient for Burger King and Jeep. In many ways they were very lucky. These were just another reminder of how important a holistic look at online security as a key aspect of risk management has become.”

But with this most recent scam on Twitter, hackers are even going as far as defaming renowned companies in the industries, and it is time that the government step in and provide the digital world with the same guiding laws as US citizens.

It seems that without the proper set of updated laws in the industry designed to punish data brokers and hackers in the same way that criminals are punished, these types of scams will undoubtedly continue. If a person steals mail from their neighbor and obtains their personal information and sells it, it is considered a federal offense and will be prosecuted by the law.

The same legal process should be applied in the online world, as it seems to have become a replacement for our real life. Just because a crime is committed in an area of cloud space doesn’t mean it shouldn’t be punished.

The reason why people don’t run around committing crimes, (mostly because they have morals), is because they are scared of the potential punishment, which has proven a successful disciplinary method since the Hammurabi Codes thousands of years ago. Even though the hacker may have been caught, which according to Gizmodo is a DJ from England, the real issue at hand is not solved.

In order to put an end to these unnecessary Twitter hacks and threatening data broker scams, the government must step in and threaten these groups of people with the law, otherwise, there is no reason for them to stop torturing the public.




Edited by Allison Boccamazzo

TechZone360 Web Editor

SHARE THIS ARTICLE
Related Articles

Post 'Clintongate': 3 Ways to Mitigate Shadow IT

By: TMCnet Special Guest    4/1/2015

What can enterprises learn from 'Clintongate'? The first lesson is that unapproved use of technology within organizations is known as "shadow IT," and…

Read More

President Obama Details Better Protection Against Cyber Threats

By: Steve Anderson    4/1/2015

Cyber threats present some of the most dangerous scenarios that can be endured by any person, or by any nation. Why? Because the threats not only rend…

Read More

Chrome OS Gets Major Push from Google

By: Joe Rizzo    4/1/2015

Android, Google's mobile operating system and Apple's iOS have about the same market share in the U.S., however in emerging regions, Android is poised…

Read More

Final Four Tips for Password Security

By: Peter Bernstein    4/1/2015

If you are like most people in the U.S. the past few weeks, you have been caught up in what is known here as "March Madness." This is the annual ritua…

Read More

Surface 3: Third Time's A Charm

By: Rob Enderle    3/31/2015

You can also update hardware with the new operating system and even though Surface sells initially with Windows 8 it will get an update to Windows 10 …

Read More