City of Joburg website security whistleblower responds

Well, since these documents could be accessed by Googles bots, they were placed in the public domain, so there is no proof of hacking here...
 
Last edited:
I'm pretty sure that the "We've been hacked!" defence was just a way to try and cover up their gross negligence with people's private info.
 
Get the Auditor General in on this then.
And let their negligence be a matter of public record to show their incompetence.
 
Usual response.

This is the standard response from whichever spin doctor is employed by COJ. Never take the blame. Its always somebody else's fault. Blame the weather, education system, Apartheid, Gamma rays whatever.
Maybe COJ should not be payed by their loyal subjects...
Bottom line:
Secure you site properly. Your site. Your responsibility.
Now also accept responsibility for any use of harvested personal details. Try to close that can of worms again.
 
I'm pretty sure that the "We've been hacked!" defence was just a way to try and cover up their gross negligence and incompetence with people's private info.
There, I corrected it for you...
 
Instead of laying a case, they should have rewarded him, just like Google and some other companies do when exploits in their apps or systems are pointed out.

Idiots.
 
it has opened a criminal case at the Hillbrow police station against the person who “hacked into its billing system” last week.
The information that was accessed was not from the transactional engine of the billing system
huh?

Get the Auditor General in on this then.
And let their negligence be a matter of public record to show their incompetence.
Not really the AGs thing. Public protector would be a bit closer to the mark I rate.
 
I'm sure the COJ already uses the best Sangoma in the business to protect their website from people altering query strings.

They have all their bases covered, it cannot possibly be their fault!
 
>>(adrianx) I'm sure the COJ already uses the best Sangoma in the business to protect their website from people altering query strings.


lmao. Quote of the day.
 
Well, since these documents could be accessed by Googles bots, they were placed in the public domain, so there is no proof of hacking here...

I can just picture the scene at the CoJ since last Tuesday, when the CoJ realised that a hacker called "Row Bots" working for Google (based on the sheer number of pdf invoice requests over a long period of time, using the same pool of IP addresses) had "maliciously hacked" into a completely unsecured web service :rolleyes:

I'm sure the COJ already uses the best Sangoma in the business to protect their website from people altering query strings.

They have all their bases covered, it cannot possibly be their fault!

:D

The perceived "protection" that a Sangoma might profess to provide, would still be better than the absolute zero protection that the CoJ had since at least February 2013 when Google seems to have started indexing pdf invoices.

The CoJ should ask king Zumatello if he will allow the use of his patented shower protection technology that can even cure HIV/AIDS and make corruption charges disappear down the drain.
 
I can just picture the scene at the CoJ since last Tuesday, when the CoJ realised that a hacker called "Row Bots" working for Google (based on the sheer number of pdf invoice requests over a long period of time, using the same pool of IP addresses) had "maliciously hacked" into a completely unsecured web service :rolleyes:
These fellas come to mind

putyvene.jpg
 
COJ web admins: robots have stolen all the invoices and all the pin numbers and are holding them hostage on Google's website

COJ managers: what is the road/intersection of these robots so we can send the Metro Police to arrest them for malicious hacking?
 
Top
Sign up to the MyBroadband newsletter