The Register Columnists

Team Register

Contact Mail Follow RSS feed
Crystal_ball

Speaking in Tech: It's all about the flashback to 1982's WangNet

Podcast speaking_in_tech Greg Knieriemen podcast enterprise #RIPTwitter, down with all the "my tech is bigger than your tech" and prognostications on the future of ONTAP: Welcome to another episode of Speaking in Tech! Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week the team is all together to talk about the death …
Team Register, 10 Feb 2016
Telstra phone booth by Ed Dunens from Flickr https://www.flickr.com/photos/blachswan/

Telstra mobile in continental TITSUP

UPDATE Australia's dominant carrier, Telstra, is experiencing a total inability to support usual performance (TITSUP) on its mobile voice and data networks. The carrier has over 16 million subscribers, no mean feat in a nation of 23 million, and charges a premium for mobile services on the basis of its networks' reach and reliability …
Team Register, 09 Feb 2016
Aquaris M10 tablet

Canonical and Spain's BQ team to put Ubuntu on a tablet

Canonical is hoping to put Ubuntu into the hands of slab-fondlers who want something that can double as a near-desktop. It's doing so via a partnership with Spanish smartphone-maker BQ, whose 10.1-inch Aquaris M10 will run the Linux distro. While the M10 is already available with a more conventional Android config at €229.90 …
Team Register, 07 Feb 2016

No patches for code exec holes in Netgear management box

Two dangerous un-patched remote code execution vulnerabilities that allow access to God-mode system privileges have been reported in Netgear's ProSafe Network Management 300 management software. The file upload vulnerability (CVE-2016-1524) and restricted directory traversal (CVE-2016-1525) allow unauthenticated attackers to …
Team Register, 07 Feb 2016
Huawei and Foxconn road sign

Foxconn to slurp Sharp for US$5.6 BEELLION

Foxconn's CEO Terry Gou says Sharp will be slurped into the Chinese manufacturer's maw by the end of February. According to Reuters, executives of the two companies have reached a consensus about the main details of the ¥659 (US$5.6 billion) deal. “We have a consensus”, he reportedly said. “The rest is a process … I don't see …
Team Register, 07 Feb 2016
Man rools out fibre cable from a large wooden cable reel on a suburban street. Pic via Pixabay

Speaking in Tech: How good is the UK's broadband? Really awful

Podcast speaking_in_tech Greg Knieriemen podcast enterprise This week your hosts, tech gurus Ed Saipetch and Sarah Vela, are in Austin for TECHunplugged to discuss Apple data centres, rumours of Yahoo! layoffs and Software Defined Storage, and why setting up a Raspberry Pi to tweet at UK ISPs every time the internet speeds drops …
Team Register, 03 Feb 2016
Sydney Harbour Bridge in the cloud

A tech conference without corporate yadda yadda? Yes, it exists

Dozens of conferences ask you to take a day out of your busy schedule, then don't do much more than bore you with derivative disruption-speak delivered by suits. VMware User Group (VMUG) Conferences are different, because VMware's users pick the content and look for material that interests real IT pros. So instead of a day …
Team Register, 02 Feb 2016

OpenSSL patch quashes rare HTTPS nasty, shores up crypto chops

OpenSSL maintainers have pushed a pair of patches, crushing a dangerous but uncommon bug that allows HTTPS to be unravelled while also hardening servers against downgrade attacks. Affected servers are open to key recovery attacks only if it runs certain Digital Signature Algorithm and static Diffie-Hellman key exchange …
Team Register, 29 Jan 2016

'Critical' Israel power grid attack was just boring ransomware

The SANS Institute has moved to quell reports that Israel's energy grid has been hit by malware, revealing instead that the attacks were ransomware infecting the nation's utility regulatory authority. Reports emerged after energy minister Dr Yuval Steinitz said a "severe" attack had hit the authority in what he reportedly …
Team Register, 28 Jan 2016

Israeli academics claim they can predict botnet attacks

Ben Gurion University researchers have developed a tool capable of predicting future botnet attacks while also distinguishing between human and automated campaigns. Dudu Mimran, chief technology officer of the university's Deutsche Telekom Innovation Labs, says the team is investigating how the tool may benefit law enforcement …
Team Register, 28 Jan 2016
Carnegie Mello's robot chimp/tank. Still from documentary "Lo and Behold".

Speaking in Tech chats to Werner Herzog about new dystopian tech documentary

Podcast speaking_in_tech Greg Knieriemen podcast enterprise This week your hosts, tech gurus Greg Knieriemen, Ed Saipetch and Sarah Vela, are back together to talk about Twitter execs, Peach and Amazon and a weird and wonderful look at network admin, the internet, robots, AI and more by legendary German director Werner Hertzog, who's …
Team Register, 27 Jan 2016
Selection of Australian banknotes

PayPal patches deadly server remote code execution flaw

Independent security researcher Michael Stepankin has reported a since-patched remote code execution hole in Paypal that could have allowed attackers to hijack production systems. The critical vulnerability affecting manager.paypal.com revealed overnight was reported 13 December and patched soon after disclosure. It allowed …
Team Register, 27 Jan 2016

RSA asks for plaintext Twitter passwords on conference reg page

Scores of security bods registering for security outfit RSA's Executive Security Action Forum (ESAF) have handed over their Twitter account passwords to the company's website in what is seen something between bad practice and outright compromise. The registration process for the February 29 event asks delegates to enter their …
Team Register, 22 Jan 2016
Imperials uniform Star Wars

Star Wars: Episode VIII delayed by six months

The Force is … well what is The Force, exactly? At a guess, perhaps it has slowed down time in Hollywood given Disney has announced a delay to the release of Star Wars: Episode VIII. The as-yet-un-subtitled next instalment of what Disney calls “The Saga” is apparently “currently in preproduction and will begin principal …
Team Register, 21 Jan 2016

Speaking in Tech: 'Software will become more integrated into the IBM story'

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Sarah is out while Ed returns to talk passwords, drones, Google and Diane Greene. Our special guest this week is Jesse Proudman, founder of BlueBox, now an IBM company. And here are the details ... (1:00) …
Team Register, 20 Jan 2016
band_aid_patching_648

Cisco patches borked web box proxy hole

Cisco has patched a vulnerability in its Web Security Appliance that allows unauthenticated remote attackers to bypass security controls. The bug (CVE-2016-1296) allows attackers to use proxies when such traffic should be restricted. Affected users of versions 8.5.3-055, 9.1.0-000, and 9.5.0-235 should apply the released fix …
Team Register, 20 Jan 2016

Amazon cloud increasingly powered by hot air

Amazon Web Services' aspiration to power its clouds with not much more than hot air are closer to fruition, after the company flicked the switch on its first wind farm. The 150 megawatt facility on Fowler Ridge in Benton County, Indiana starting pumping out electrons on the first of January when it made over “1.1 million …
Team Register, 18 Jan 2016

Updated Android malware steals voice two factor authentication

Malware-makers are stepping up the assault on Android handsets and are now quietly redirecting phone calls to steal voice-based two factor authentication details. An update to the Android.Bankosy trojan horse means it not only locks down handsets but steals data from hacked devices. Symantec threat-throttler Dinesh Venkatesan …
Team Register, 18 Jan 2016
shutterstock_306575414_woman_programmer

Skype now translates in real-time into seven languages

Microsoft has delivered its promised real time translation service in Skype. Redmond's VoIP service can now comprehend Mandarin, English, French, German, Italian, Portuguese and Spanish and convert one to another as you chat. With one caveat: it's on Windows only for now, although Microsoft promises more languages and …
Team Register, 15 Jan 2016

Norway cops, Europol, throw cage over RAT

Five hackers arrested last month in a sting coordinated by Norway police have been revealed as running the MegalodonHTTP remote access trojan. The Kripos-Europol operation codenamed "OP Falling sTAR" has been kept largely under wraps until security firm Damballa revealed the name of the malware involved. The US security firm …
Team Register, 15 Jan 2016

Cloud Security Alliance says infosec wonks would pay $1m ransoms

Some companies will pay hackers up to US$1 million in ransoms to claw back stolen data according to a poll by the Cloud Security Alliance. The survey garnered 209 respondents of which half were in IT security and a third from tech with most hailing from companies with up to 1000 staff and a quarter from large enterprises with …
Team Register, 14 Jan 2016
Shounting man in suit image via Shutterstock

Speaking in Tech: The worst CEO of 2015? Have a listen

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Ed is missing so Amy Lewis jumps in to take his seat while we talk about documentaries, podcast pimps, dead phones and adult toys at Amazon. And the details are as follows: (1:00) Amy pinch hits for Ed (2 …
Team Register, 13 Jan 2016
casino_security_648

As easy as 'Citrix123' – hacker claims he popped Citrix's CMS

A Russian hacker claims he broke into systems run by Citrix, and gained access to potentially a huge number of customers. The binary buster known as "W0rm" exploited weak credentials – the username press@citrix.com and the password Citrix123 – to get into the content management system that powers Citrix's websites. W0rm …
Team Register, 13 Jan 2016

Nvidia GPUs give smut viewed incognito a second coming

Updated Canadian student hacker Evan Andersen says Nvidia graphics cards retain content users would rather not be preserved, such as the material appearing in web pages viewed in the supposedly-private "incognito mode" offered by Google's Chrome browser. The flaws were reported to Nvidia and Google in 2014; the former did not respond …
Team Register, 11 Jan 2016
Bubblecar Berkeley

General Motors turns key on bug bounty program

General Motors (GM) has opened a bug bounty program to allow hackers to report vulnerabilities in its vehicles. Vulnerability reporting guidelines are stringent; GM agrees not to "pursue claims" against researchers if bug hunters do not harm or violate the privacy of GM or its customers, drop a zero day, or breach criminal law …
Team Register, 11 Jan 2016
BOX OF ASSORTED DOUGHNUTS (AND A CRONUT). Photo by Shutterstock

New Year, new Git: Version control system updated this week

The Git community was obviously working hard over the festive break, and slipped out version 2.7.0 of the control system earlier this week. The new version includes yet another array of updates and fixes, the full list of which you can peruse here. Github highlighted more flexible naming for git bisect, the tool for working …
Team Register, 07 Jan 2016
Angry baby. Pic: Luke Addison/Flickr

Speaking in Tech: Rant at fools on Facebook? You pass the IQ test

Podcast speaking_in_tech Greg Knieriemen podcast enterprise It's another wrapup of the week in tech hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Ed, Sarah and Greg are all together to discuss EMC cuts, Lyft, Zuck's reacharound and SolidFire. Special guest this week is Jeramiah Dooley of SolidFire. The details …
Team Register, 06 Jan 2016
Continuous Lifecycle London 2016 logo

Etsy’s DevOps supremo to take the stage at Continuous Lifecycle

Re Events We’re really chuffed to announce that Etsy’s Katherine Daniels will be joining us at Continuous Lifecycle London next May as one of our keynote speakers. Katherine is a senior operations engineer with Etsy, overseeing systems that support 54 million members, 1.4 million active sellers, and 19.8 million active buyers. To keep …
Team Register, 05 Jan 2016

Ruskie rats selling Choose-Your-Own-Adventure love scams

Russians have delivered another blow to beleaguered love rats with the sale of automated and plug-and-play online dating scam packages. The services are slung on underground crime sites and promise a response rate of 1.2 percent from love luckless men. The rort will earn net scum US$2,000 a week if they send out 30 romance …
Team Register, 05 Jan 2016
2016 New year's message written on tablet which is resting on a laptop keyboard. Photo by Shutterstock

The Register's entirely serious New Year's resolutions for 2016

We launched as an email newsletter in 1994, hit the web four years later and are now a multinational media entity operating on three continents. Millions of people read us every month, which is humbling. We may have missed our birthday, but did do some proper “we've turned 21 and that means we're probably quite grown up now” …
Team Register, 04 Jan 2016
Continuous Lifecycle London 2016 logo

Jez Humble to deliver keynote at Continuous Lifecycle London

Reg Events If you want to hear a bona fide DevOps view from the top you’ll be be as pleased as we are that Jez Humble will be taking to the stage to deliver a keynote speech at the Continuous Lifecycle London conference next May. Jez, together with editorial board member Dave Farley, literally wrote the book on DevOps. In fact he’s …
Team Register, 28 Dec 2015

Speaking in Tech: Hadoop, Donald Trump, Apple TV - what do they have in common?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise It's Greg and the gang's annual predictions podcast, marking the 191st episode of Speaking in Tech. Enterprise tech gurus Greg Knieriemen, Ed Saipetch and Sarah Vela take a look at what the future holds for Hadoop, Apple TV, Netflix, HP, NetApp, Cisco, Trump, on-prem data …
Team Register, 23 Dec 2015
Shounting man in suit image via Shutterstock

Speaking in Tech: That’s going to look really bad on LinkedIn!

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Want to hear a funny wrap-up of everything important that happened in the tech world this week? Enterprise and consumer kit gurus Greg Knieriemen, Ed Saipetch and Sarah Vela are here to discuss the SolidFire-NetApp rumours, Virtustream, VMware, whether “Personal conduct” …
Team Register, 17 Dec 2015
Continuous Lifecycle London 2016 logo

Continuous Lifecycle London – Early Bird Tickets Available Now

Reg Events Tickets for Continuous Lifecycle London 2016 are on sale now, and we’re offering you the chance to save £200 on the two day conference price. Brought to you by The Register and our partners Heise, Continuous Lifecycle London 2016 will run from May 3 to 5, 2016, and will be the place to dive deep into the tools and …
Team Register, 14 Dec 2015
Old man reading The Sun. Pic: Daniel Novta

Rupert Murdoch wants Google and chums to be g-men's backdoor men

In Brief Rupert Murdoch has come to the aid of Republican Senator Lindsey Graham, urging Google, Apple and other tech giants to change their stance on encryption. Graham, who is a presidential candidate for the GOP alongside blowdryer-favouring asshat Donald Trump, once again railed against Silicon Valley players and called for them to …
Team Register, 11 Dec 2015
Hillary Clinton

Speaking in Tech: Look out Isis/Isil/IS/Daesh, Hillary could unleash Silicon Valley

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Brian Gracely steps in to join Sarah and Greg to talk Pure Storage, hacking ISIS, hair dryers, and even more Dell EMC stuff. Our special guest this week is Chad Sakac, president for Global Systems Engineering …
Team Register, 09 Dec 2015

Brits leave 138,000 gadgets in the pub

Drunk Brits lose 138,000 devices a year in bars but get most of them back, according to a pub poll by security firm Eset. The mobile security vendor pinged 600 establishments across the country and extrapolated the results to come up with the 138,000 approximation. Mobile devices were often dropped in watering holes across …
Team Register, 08 Dec 2015

Cheque, mate? Barclays Bank borked as website, apps take cheeky siesta

Barclays Bank suffered an outage to its system which crippled the company's online service for hours on Monday afternoon. It's finally coming back to life, after the bank admitted around lunchtime today that its website and apps had fallen offline. Barclays told customers in a tweet: "We’re currently seeing some issues across …
Team Register, 07 Dec 2015

Industrial control system gateway fix opens Heartbleed, Shellshock

Rapid 7 security man Todd Beardsley says new firmware released to patch hardcoded SSH keys in Advantech EKI industrial control system gateways contains known brutal flaws including Shellshock, Heartbleed, and buffer overflows. A module for the Metasploit hacking box has been published to help attackers hose the zero day holes …
Team Register, 03 Dec 2015
LSD

Speaking in Tech: Is the whole of Silicon Valley on LSD?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise It's another episode of El Reg's favourite techcast, hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Sarah returns to join Eddie and Greg to talk SDI (not the Reagan thing), that Rolling Stone report on San Fran techies and LSD (in really small doses), …
Team Register, 02 Dec 2015
Kangaroos by https://www.flickr.com/photos/lavroff/ cc 2.0 https://creativecommons.org/licenses/by/2.0/

Report fingers China for assault on Australian weather supercomputer

The Australian Broadcasting Corporation (ABC) reports that China has been fingered as the source for a very substantial attack on a supercomputer operated by Australia's Bureau of Meteorology (BoM). The BoM is an analog of the UK's Met Office and the USA's National Weather Service. Like those agencies, the BoM provides weather …
Team Register, 02 Dec 2015

BlackBerry to bug out of Pakistan by end of year

Blackberry will pull out of Pakistan on New Year's Eve in protest of its government's demand to intercept and decrypt people's communications. The Canadian company refuses to open what it considers a backdoor in its BlackBerry Enterprise Service (BES). Pakistan's Telecommunication Authority in July asked BlackBerry and other …
Team Register, 01 Dec 2015
Scotty in the original Star Trek

BT inks deal with HP Enterprise – beams cloud to biz customers

In brief Blighty telecoms giant BT has struck a cloudy deal with HP Enterprise for an undisclosed sum. The company said that its IP VPN customers can now hook up directly to HPE's Helion managed cloud services. BT claimed that the direct link up would help customers to have more "reliable and secure access" when building workloads. …
Team Register, 30 Nov 2015
spy_eye_648

Walmart spied on workers' Tweets, blogs before protests

Walmart has recruited aerospace, defence and security concern Lockheed Martin to comb open source intelligence in the lead up to Black Friday union protests, Bloomberg reports. The super-colossal retailer has a difficult history with unions and engaged the defence contractor to keep tabs on its employees in the run up to the …
Team Register, 30 Nov 2015

Lenovo slings privilege patches at in-built tools

IOActive security bod Sofiane Talmat has found two since-patched privilege escalation vulnerabilities in Lenovo System Update utility. The tool keeps drivers and BIOS up to date. Talmat found the tool's help function contains a vulnerability (CVE-2015-8109) that can allow regular users to gain administrative access. "Since …
Team Register, 26 Nov 2015
big dog little dog, image Shutterstock

Speaking in Tech: Is Dell's EMC acquisition doomed, or just too big to fail?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, with Sarah still on her travels, Amy Lewis joins Eddie and Greg to talk Dell/EMC, storage stocks, the wild world of storage (featuring Pure and Nimble), and bad certificates. Our special guest this week is …
Team Register, 25 Nov 2015
Bookshelf in the British Library basement

Amazon resets account passwords feared compromised – report

Amazon.com appears to be asking some of its customers to reset passwords after a breach of some sort. The online bazaar apparently sent cryptic emails to some of its account holders warning them that their passwords were blabbed in some way, and therefore have to be changed. "We recently discovered that your password may have …
Team Register, 25 Nov 2015
Android icon desktop toys

Top Android app devs found exfiltrating mystery stealth packets

Four researchers have found two thirds of the most popular Android apps indulge in seemingly-useless covert chatter with remote servers. Top developers including Gameloft, Unity3d, and grillgames are implicated to varying degrees. The chatter has no use to users. About half of the traffic is related to analytics, such as that …
Team Register, 23 Nov 2015

Researchers say they've cracked the secret of the Sony Pictures hack

Damballa researchers Willis McDonald and Loucif Kharouni say the attackers who flayed Sony Pictures with disk-cleansing malware may have stayed hidden using newly-uncovered anti-forensics tools. The pair found the updated weaponry in the latest version of the Destover malware, best known as the malware that in November last …
Team Register, 23 Nov 2015

Android's accessibility service grants god-mode p0wn power

Michael Bentley of security-through-analytics outfit Lookout has found android malware that does not require user permission to install. Bentley, Lookout's head of response, says the Shedun malware accomplishes the feat using the Android's accessibility features. When installed the malware will use the accessibility service …
Team Register, 20 Nov 2015