- Marionville mayor ‘kind of agreed’ with Kansas City shooter’s views
- Rev. Al Sharpton’s Easter message: Politically ‘crucified’ Obama has risen again
- Supreme Court to weigh challenge to ban on campaign lies
- UNICEF launches ‘Mr. Poo’ mascot in India to curb public defecation
- Teen taking selfie by train: ‘Wow, that guy just kicked me in the head’
- Goodbye, Afghanistan — hello, Africa: Air Force to shift as U.S. exits Middle East
- Iran mulls ban on vasectomies, decrease on abortions to bolster population
- CNN op-ed claims right-wingers ‘more deadly than jihadists’
- Classes resume at high school rocked by stabbings
- ABC News accuses Center for Public Integrity of stealing Pulitzer-winning work
Users of some D.C. online services get malware warning
Local residents looking to pay parking tickets or use other online services from the D.C. government in the past week were greeted with an ominous message, saying their use of the city’s website could expose them to malicious software.
The alert was a result of something or someone, such as a computer user looking to exploit weaknesses in the system, trying to burrow into the D.C. Community Calendar application on July 31, city officials said.
Ayanna Smith, spokeswoman for the office of the chief technology officer (OCTO), said the attack was resolved within a day and did not compromise any personal information or pose a threat to users’ computers. But people who later logged onto apps.dc.gov encountered a message from Google, which trolls the Web for potentially dangerous sites, that warned: “The website you are visiting appears to contain malware.”
The incident raised eyebrows among users who wanted to pay their parking tickets — fines double if they wait too long — or use other online services offered by the District.
Joshua Miller, 34, who lives in the Brightwood neighborhood of Northwest, was among several people who logged onto Twitter to ask the D.C. Department of Motor Vehicles whether its site was safe. He wanted to schedule an inspection but was not satisfied with the agency’s response to his query.
“Instead of saying, ‘No, there’s no problem,’ they said, ‘You need to use a browser other than Chrome,’” Mr. Miller said. “That’s the equivalent of saying, ‘Turn off your antivirus package and you’ll stop getting notices that your computer is infected.’”
DMV spokeswoman Vanessa Newton said Tuesday the agency’s website is secure, “and the public can continue to pay tickets as well as conduct other DMV business online.”
But the episode shined a light on the vulnerabilities attached to an increasingly cyber-based world. The District, like other governments, is leveraging user-friendly programs and apps that make it easier to tackle the concerns of city life, such as feeding the parking meter or sounding off on city agencies.
Ms. Smith acknowledged that it would be understandable for customers to be wary of entering their private payment information after seeing the message, which interrupted browsing with a warning inside a red-bordered box. It informed users of the potential malware and allowed them to click “Ignore Warning” or “Go Back.”
The screen also directed users to a Google diagnostics page, which said app.dc.gov was “suspicious” but had not hosted malware or served as an intermediary for infection of any other sites. Its testing over the past 90 days, however, showed “two pages resulted in malicious software being downloaded and installed without user consent.”
Google launched its Safe Browsing system five years ago to guard against malicious content on the Internet among its search results and ads as well as content on popular browsers such as Chrome, Firefox and Safari. While Google does not comment on specific websites, “our systems appear to be working as intended,” spokesman Jay Nancarrow said.
In general, small businesses that use common, commodity software are targeted for malware attacks more frequently than larger entities, said Maxim Weinstein, executive director of Stop Badware, a nonprofit organization that works to eliminate malware, spam and other invasive Web applications.
“I wouldn’t say we see it extensively on government sites,” he said, noting “Google’s detection accuracy is extremely high, without coming up with many false positives.”
But, he added, it is not uncommon for warning messages to linger after an issue has been resolved — calling ongoing attention to what can be an embarrassing situation.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Tom Howell Jr. covers politics for The Washington Times. He can be reached at firstname.lastname@example.org.
- Pelosi to speak at Bard commencement, Bachmann at Oral Roberts
- Minnesota the latest to employ Deloitte to fix Obamacare tech issues
- Law firm that cleared N.J. Gov. Christie in 'Bridgegate' gave 10K to RGA, which he heads
- New debate: Should Congress use technology to spend less time in D.C.?
- Americans prefer Democrats' approach to health care: poll
Latest Blog Entries
TWT Video Picks
An appeals court upholds the Senate's right to make its filibuster rules
- 'Culture of intimidation' seen in Nevada ranch standoff
- Rand and Ron Paul ride to the rescue for Bundy in Nevada standoff with feds
- Nevada Bundy ranch standoff could leave dirt on Harry Reid reputation
- WEBER: Obamacare cuts home healthcare for millions of seniors
- Atheists rush to stage Easter display: 'Jesus Christ is a myth'
- Fuel-filled wings, ability to swarm: Pentagon offers glimpse at future of drone fleet
- U.S. Navy to turn seawater into jet fuel
- CARSON: Recovering Tocqueville's vision of American exceptionalism
- GOP writes legislation to deny Attorney General Eric Holder his salary
- UNICEF launches 'Mr. Poo' mascot in India to curb public defecation
Celebrity deaths in 2014
Top 10 handguns in the U.S.