- Obama downplays IRS scandal, blames Obamacare rollout on ‘outdated’ agencies
- Pregnancies decline overall, up among older women
- Pentagon plans to destroy Syrian chemical arms on ship at sea
- Paris Metro issues ‘politeness manual’ to improve passengers’ behavior
- Justin Bieber, crew detained at Australian airport in drug search
- Lee Rigby trial: Muslim who machete-hacked soldier calls it ‘humane’ kill
- GM ending Chevy sales in Europe to focus on Opel and Vauxhall
- Putin’s diplomats to U.S. busted for living high life off $1.5M bilked from Medicaid
- Happy Meal: Couple goes to McDonald’s, leaves with bag packed with cash
- Boehner: It took me 3 to 4 hours to sign up for Obamacare
Users of some D.C. online services get malware warning
Local residents looking to pay parking tickets or use other online services from the D.C. government in the past week were greeted with an ominous message, saying their use of the city’s website could expose them to malicious software.
The alert was a result of something or someone, such as a computer user looking to exploit weaknesses in the system, trying to burrow into the D.C. Community Calendar application on July 31, city officials said.
Ayanna Smith, spokeswoman for the office of the chief technology officer (OCTO), said the attack was resolved within a day and did not compromise any personal information or pose a threat to users’ computers. But people who later logged onto apps.dc.gov encountered a message from Google, which trolls the Web for potentially dangerous sites, that warned: “The website you are visiting appears to contain malware.”
The incident raised eyebrows among users who wanted to pay their parking tickets — fines double if they wait too long — or use other online services offered by the District.
Joshua Miller, 34, who lives in the Brightwood neighborhood of Northwest, was among several people who logged onto Twitter to ask the D.C. Department of Motor Vehicles whether its site was safe. He wanted to schedule an inspection but was not satisfied with the agency’s response to his query.
“Instead of saying, ‘No, there’s no problem,’ they said, ‘You need to use a browser other than Chrome,’” Mr. Miller said. “That’s the equivalent of saying, ‘Turn off your antivirus package and you’ll stop getting notices that your computer is infected.’”
But the episode shined a light on the vulnerabilities attached to an increasingly cyber-based world. The District, like other governments, is leveraging user-friendly programs and apps that make it easier to tackle the concerns of city life, such as feeding the parking meter or sounding off on city agencies.
Ms. Smith acknowledged that it would be understandable for customers to be wary of entering their private payment information after seeing the message, which interrupted browsing with a warning inside a red-bordered box. It informed users of the potential malware and allowed them to click “Ignore Warning” or “Go Back.”
The screen also directed users to a Google diagnostics page, which said app.dc.gov was “suspicious” but had not hosted malware or served as an intermediary for infection of any other sites. Its testing over the past 90 days, however, showed “two pages resulted in malicious software being downloaded and installed without user consent.”
Google launched its Safe Browsing system five years ago to guard against malicious content on the Internet among its search results and ads as well as content on popular browsers such as Chrome, Firefox and Safari. While Google does not comment on specific websites, “our systems appear to be working as intended,” spokesman Jay Nancarrow said.
In general, small businesses that use common, commodity software are targeted for malware attacks more frequently than larger entities, said Maxim Weinstein, executive director of Stop Badware, a nonprofit organization that works to eliminate malware, spam and other invasive Web applications.
“I wouldn’t say we see it extensively on government sites,” he said, noting “Google’s detection accuracy is extremely high, without coming up with many false positives.”
But, he added, it is not uncommon for warning messages to linger after an issue has been resolved — calling ongoing attention to what can be an embarrassing situation.
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
Tom Howell Jr. covers politics for The Washington Times. He can be reached at email@example.com.
- House Speaker John Boehner: It took me 3 to 4 hours to sign up for Obamacare
- Young millennials shun Obamacare, creating risky imbalance
- Almost 1.5 million deemed eligible for Medicaid in October alone: Obama administration
- Federal judge set to decide Obamacare battle over subsidies
- Diagnosis: Health site better, but needs work
Latest Blog Entries
- Calif.: Give 'gift of health' by pledging cash for the uninsured
- Tensions hit boiling point over Obamacare enrollment figures, error rates
- Young, uninsured adults vital to Obamacare are not keen on enrolling: New Harvard poll
- Paul Bunyan and Babe the Blue Ox will promote Obamacare at Mall of America
- HealthCare.gov employs a new look once again
- 'Hunger Games' delivers Obama's message on income inequality: liberal group
- NAPOLITANO: Pope Francis should be saving souls, not pocketbooks
- CARSON: Getting to the top by starting at the bottom
- Inside China: Nuclear submarines capable of widespread attack on U.S.
- Obama returns to class warfare as poll numbers plunge
- Hack attack: 2 million Facebook, Twitter passwords stolen
- Democratic infighting erupts over 'we can have it all' fantasy on entitlements
- U.S. pilot scares off Iranians with 'Top Gun'-worthy stunt: 'You really ought to go home'
- U.S. drops 2,000 mice on Guam by parachute to kill snakes
- CURL: 'Mission Accomplished' for Obamacare
Independent voices from the The Washington Times Communities
White House pets gone wild!