Feeds

AMD-hosted WLAN used to infect security hack's PC

So that's what a firewall's for...

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

AMD would like you to know that its mobile Athlon 64 goes very nicely with 802.11 wireless networking. And in a bid to get hacks assembled at its Cannes launch event this week to think 'wireless', the chip maker thoughtfully laid on a WLAN for them to use to quickly file column inches for their respective rags.

Notebook-equipped journos without the requisite Wi-Fi support were handed some rather nice AMD Alchemy-branded 802.11b PC Cards. As for journos without laptops... well they just had to use the time honoured method of reading their copy to a typist at the other end of a phone line.

We were tickled to see AMD's temporary hot spot was powered by a pair of Apple AirPort Extreme base-stations. So much for AMD's backslapping message of support from WLAN chipset maker Atheros - the Apple kit is based on technology from Atheros' rival, Broadcom.

However, the Apple product also contains one of AMD's Alchemy embedded processors, so that's fair enough, we reckon.

But whoever made the Wi-Fi infrastructure, it still wouldn't have prevented one crafty so-and-so from attempting to infect the assembled portable PCs with a LAN-borne virus. The culprit's identity remains a mystery. Was it a hack? An AMD customer, perhaps? Maybe even an employee?

We can't say - what we can reveal is that at least one UK tech journalist of many years standing was caught napping. Despite often advising novice - and not-so-neophyte - readers of the benefits of firewall technology, had our colleague remembered to enable his own firewall, provided free of charge by Windows XP? Had he heck... Fortunately, his AV software came to the rescue and quashed the infection before it had got too far into the bowels of his machine.

Should this unfortunate creature be named? We think not - it was punishment enough to survive the jeers and jibes of his fellow tech-heads earlier today when he confessed his culpability.

We'd simply note that in a recent edition of Computing the poor fellow was asked to "discuss matters of security best-practice and assemble a comprehensive check-list of do's and don'ts that a company can use in order to improve their data and business security procedures and operations", according to the paper's briefing sheet.

Ahem. ®

Security for virtualized datacentres

More from The Register

next story
Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen
Angry Microsoftie hauls auctioneers to court over stalled Pzkw. IV 'deal'
WRISTJOB LOVE BONANZA: justWatch sex app promises blind date hookups
Mankind shuffles into the future, five fingers at a time
Apple's Mr Havisham: Tim Cook says dead Steve Jobs' office has remained untouched
'I literally think about him every day' says biz baron's old friend
Flaming drone batteries ground commercial flight before takeoff
Passenger had Something To Declare, instead fiddled while plane burned
Cops apologise for leaving EXPLOSIVES in suitcase at airport
'Canine training exercise' SNAFU sees woman take home booming baggage
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.