The Register Columnists

Team Register

Contact Mail Follow RSS feed

Speaking in Tech: Worst OpenStack summit ever?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise This week Ed Saipetch returns with Greg Knieriemen to discuss Dell EMC World and OpenStack conferences as well as news from CenturyLink, Microsoft and Apple. Melissa Gurney has a field report with game developer Greg Heath of Motiga Games to discuss Gigantic. The details …
Team Register, 02 Nov 2016
big dog little dog, image Shutterstock

Speaking in Tech: EMC v Pure – Stop bickering with the big dog

Podcast speaking_in_tech Greg Knieriemen podcast enterprise This week Ed is in Barcelona while Greg and Amy sort out the week's tech news. The last of the Podcast Idols, Phoummala Schmitt (aka @ExchangeGoddess) and Theresa Miller of The Current Status, join us this week to discuss AWS, lawsuits, Facebook and open source switches. …
Team Register, 26 Oct 2016
retro cartoon featuring two men fighting against cloud backdrop

Speaking in Tech: Is OpenStack really a threat to VMware?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise It's another episode of El Reg's tech-cast, and this week Greg and Ed dig into the pros and cons of the VMware Cloud announcement with AWS with Greg Ferro of Packet Pushers. Podcast Idol Peter Smallbone wraps up the podcast with a field report from IT Expo with VMware CTO …
Team Register, 19 Oct 2016
Continuous Lifecycle London 2016 logo

Continuous Lifecycle 2017: Meet the committee...

If you’re still working up your proposals for our Continuous Lifecycle London conference next year, you might want to consider the calibre of tech pro who’ll be perusing your proposals. Whether you’re a prospective speaker, or attendee, you’ll be pleased to know we’ve got a mix of Continuous Lifecycle London veterans and some …
Team Register, 17 Oct 2016
Two angry businessmen fighting over agreement signing. Coffee is spilled. .Photo by Shutterstock

Speaking in Tech: 'Healthy friction' among vendors at Cloud Foundry

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Tech podcasters At Large Ed Saipetch and Greg Knieriemen are back with Podcast Idol candidate James Honey of SolarWinds. His special guest is Laz Vekiarides, CTO and co-founder of ClearSky Data. The nerds put Dell, Cisco, VMware and AWS into the podcast blender this week to …
Team Register, 12 Oct 2016

London cops charge ATM malware hacker

London Police have continued to bag and tag criminals who installed malware in ATMs across the city, with the extradition of a Romanian man to the UK last week. Emanual Leahu was charged with conspiracy to defraud as part of a gang that stole some £1.5 million from ATMs across London in 2014. Gang members Grigore Paladi and …
Team Register, 07 Oct 2016

Google's Chrome cloaks Pirate Bay in red screen of malware death

Google is warning users to stay away from infamous unauthorised content distribution site The Pirate Bay, as it says the torrent attic is bad for PC health. Mountain View has generally shied away from flagging the torrent site as a malicious entity, other than a handful of times when it was caught serving malware through its …
Team Register, 07 Oct 2016

Russia mulls pirate penalties

Russia is considering implementing fines for illegal downloading of copyrighted content. Local media, citing sources familiar with an early-stage proposalå, say it could mimic German laws where illegal downloaders can be fined under cease-and-desist orders capped at ‎around €100 for simple infringement. Fines would complement …
Team Register, 05 Oct 2016

German cops, mobe malware

Germany's federal investigative police agency (BKA) is seeking permission to infect smartphones with its home baked PC trojan for surveillance of serious crime.Strike text The agency wants to develop a derivative of its trojan named the Bundestrojaner for mobile devices should its request to German Parliament be approved, …
Team Register, 04 Oct 2016

Apple iMessage URLs ship OS, device, and IP data to sites, dev says

British developer Ross McKillop says Apple's implementation of URL previews leaks users' IP address and operating system information to websites. The leakage might be a boon to spammers, who could use the operating system information and IP address data to better hone their attacks. Links subject to previews, which displays …
Team Register, 04 Oct 2016
image by TSHIRT-FACTORYdotCOM http://www.shutterstock.com/gallery-110716p1.html

Yahoo! Answers used to cloak command and control networks

Two malware instances have converted numbers to words in a novel attempt to cloak the IP addresses of command and control servers. Researchers within Palo Alto's "Unit 42" team say the malware points to location references within text written on certain public pages including Yahoo! Answers and Quora. The unusual initiative …
Team Register, 29 Sep 2016
Image by hobbit http://www.shutterstock.com/gallery-1008401p1.html

152k cameras in 990Gbps record-breaking dual DDoS

The world's largest distributed denial of service (DDoS) attack has been clocked from the same network of 152,463 compromised low-powered cameras and internet-of-things devices which punted a media outlet off the internet. Last days, we got lot of huge DDoS. Here, the list of "bigger that 100Gbps" only. You can see the …
Team Register, 27 Sep 2016

Swiss vote for spy powers

Switzerland has decisively voted in new surveillance laws granting the country's law enforcement agencies powers closer to those in other western nations. The referendum vote passed with a 66.5 per cent majority on a low voter turnout, carried notably on the back of positive sentiment from the country's older voters. The laws …
Team Register, 27 Sep 2016

Patch AGAIN: OpenSSL security fixes now need their own security fixes

Sysadmins and devs, fresh from a weekend spoiled by last week's OpenSSL emergency patch, have another emergency patch to install. One of last week's fixes, for CVE-2016-6307, created CVE-2016-6309, a dangling pointer security vulnerability. As the fresh advisory states: “The patch applied to address CVE-2016-6307 resulted in …
Team Register, 26 Sep 2016
Trophy. Image via Shutterstock

Think you’re a Tech Trailblazer but still warming up?

We know some blazers take longer to warm up than others, so you’ll be pleased to know that the deadline for this year’s Tech Trailblazers Awards has been extended to October 6. These awards have been running for six years, recognising and rewarding real innovation in real world business tech. So you can use that extra time to …
Team Register, 23 Sep 2016
band_aid_patching_648

OpenSSL swats a dozen bugs, one notable nasty

A dozen flaws have been patched in OpenSSL, including one high severity hole that allows denial of service attacks. The OpenSSL Project pushed patches in versions 1.1.0a, 1.0.2i and 1.0.1u, with most of the flaws flagged as low severity risks. The nastiest vulnerability (CVE-2016-6304) results when attackers issue a massive …
Team Register, 23 Sep 2016
Quick fix - worker running while carrying a wrench

Drupal patches bad bugs

Drupal has patched two critical vulnerabilities in version 8 of the content management system. The bugs include a cross-site scripting flaw and another allowing non-admin but privileged users to download data configuration reports. Other flaws allowed some attackers to expose comments to different levels of visibility. …
Team Register, 23 Sep 2016
Image by gyn9037 http://www.shutterstock.com/gallery-691846p1.html

Valid logins to your workplace are on the net, right now

Enterprises are almost universally open to intrusion attempts with stolen credentials, and are at increased risk from compromised smartphones thanks to a spike in device malware. The findings stem from two separate studies. Digital Shadows research [PDF] reveals 97 percent of the Fortune top 1000 largest companies face …
Team Register, 23 Sep 2016
Privacy image

EyePhones packing Iris-scanning authentication to go mainstream

ABI Research analyst Marina Lu has picked iris scanning as "one of the safest" means to secure user identities on smartphones. The Singapore-based researcher says the Samsung Galaxy Note 7 released last month will help spread the technology and increase adoption of mobile payments. Lu says the biometric authentication …
Team Register, 22 Sep 2016

Google automates Apps OAuth token revocation

Google has refined the security controls available to enterprise Gmail users by automatically killing OAuth 2.0 tokens for Apps when users change passwords. The changes will land on October 5th and will not affect users unless they change their password. It is a watered down version of planned security changes offered in …
Team Register, 22 Sep 2016
A grey beard

Greybeards beware: Hair dye for blokes outfit Just For Men served trojan

Malware writers have penetrated the website of hair-dye-for-greying-blokes outfit Just For Men, foisting a password-stealing trojan at visitors, Malwarebytes researcher Jerome Segura says. Attackers are using the RIG exploit kit, which recently dethroned Neutrino as the most popular of the off-the-shelf crime kits that make …
Team Register, 21 Sep 2016

FBI overpaid $999,900 to crack San Bernardino iPhone 5c password

University of Cambridge senior research associate Sergei Skorobogatov has laid waste to United States Federal Bureau of Intelligence (FBI) assertions about iPhone security by demonstrating password bypassing using a $100 NAND mirroring rig. FBI director James Comey made the claim during the agency's bid to defeat the password …
Team Register, 19 Sep 2016

T-Mobile USA leaked free access to sites with '/speedtest' in the URL

American T-Mobile subscribers can score free internet access by running traffic through a proxy with "speedtest" in its URL. Seventeen-year-old high school student Jacob Ajit found the loophole , since taken down, which allowed cheapskates to access T-Mobile's data network without paying. Ajit realised speed testing sites and …
Team Register, 19 Sep 2016

Wanna prove you’re a Tech Trailblazer? Entries close in a week

You’ve got less than week to pull together your entry for the 2016 Tech Trailblazer awards There’s plenty of scope to put your big idea in the spotlight this year, with 11 categories spanning real enterprise innovation areas such as such as big data, cloud, IoT, virtualization, storage and security. Or you can really shoot …
Team Register, 16 Sep 2016
Image: Seinfield. Credit: NBC.

Alibaba fires gluttons

Four Alibaba staff have been sacked after they hacked their employer company to score free mooncakes. The weird act reported by the China Daily landed the hackers 496 of the much-loved red bean pastries consumed in China during the upcoming Mid-Autumn Festival. Alibaba's lauded security team took two hours to notice the …
Team Register, 16 Sep 2016

Biting the hand that feeds IT © 1998–2017