Feeds

Brazilian cleaner spots security hole in Heathrow e-borders

Steve McQueen fan, clearly...

Secure remote control for conventional and virtual desktops

The arrest of yet another illegal immigrant working at the House of Commons has revealed an unexpected vulnerability in the Home Office's plan to secure the UK's borders. What if they arrive at Heathrow and just run for it?

Brazilian woman Elaine Chaves Aperecida appears to have hit on something akin to this splendidly old-tech plan when she was detained by immigration officials in December 2004. Then, reports the Telegraph, she ran way from immigration officials before she could be refused entry.

It's not something Register hacks had previously noted, but yes now you mention it, UK immigration officials generally don't look either heavily armed or particularly athletic. So just familiarise yourself with the terminal maps during the flight, sprint for it and - having donned the apron secreted in your hand luggage - lose yourself among London's cleaning staff.

Which is certainly the outcome Elaine achieved until two weeks ago, when she was detained "after a random check on her security pass." This appears to have belonged to someone else, but she is reported to have been working in Parliament since early December, presumably using the same pass. Or perhaps not - officials seem not to know where she got the pass or to whom it had been issued in the first place, so perhaps the cleaners have a bucket of them that they just share around.

Traditionally UK Parliamentary passes have been ludicrously insecure and uncontrolled, but as the Telegraph notes, a new entry system was introduced last year, and the fact that Chaves was able to work there anyway for two months suggests that it's just as hopeless as the last system. Which we think is what we said here. ®

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.