Articles about Blacklist

Nymaim malware got a major 'upgrade', says Verint

The miscreants behind the Nymaim malware dropper have updated their code to include better obfuscation and blacklisting against security software. Analytics outfit Verint, which discovered the latest version and offers its analysis here, says the new code base targets phishing rather than the drive-by-download approach …
Spam

Boffins predict web scams with domain registration data

A group of American boffins is loosing artificial intelligence on web scams, demonstrating that analysis of domains at the time of registration can provide an early warning of those that will later be home to spammers and scammers. The idea is to tag the kinds of behaviour at registration time that hints someone is preparing …

Spam scum ping global blacklists to wreck rep

Malware authors are consulting IP blacklists designed to help fight spam in a bid to avoid detection and increase inbox hit rates. The novel abuse allows malware authors to determine if they have infected clean and benign machines. "This malware is interesting because it contains a hardcoded list of commonly known blacklist …
Darren Pauli, 21 Oct 2016

Russia mulls pirate penalties

Russia is considering implementing fines for illegal downloading of copyrighted content. Local media, citing sources familiar with an early-stage proposalå, say it could mimic German laws where illegal downloaders can be fined under cease-and-desist orders capped at ‎around €100 for simple infringement. Fines would complement …
Team Register, 05 Oct 2016

Inside our three-month effort to attend Apple's iPhone 7 launch party

It's been a number of years since an Apple PR staffer secretly admitted to one of our reporters that The Register was on a blacklist. We also learned that they were under strict instructions never to admit to the blacklist – presumably because it would make one of the world's largest companies look, you know, pathetically …
Kieren McCarthy, 07 Sep 2016
Google's Santa project

Google hopes to sniff out OS X badware

Google's Macintosh Operations Team has quietly been working on a whitelisting application for OS X . Code-named Santa, the software (currently described as pre-1.0) has an SQLite database holding a list of permitted and blocked applications; a userland daemon to check the database; a kernel extension to monitor for executions …

Baddie addies

Security firm RiskIQ reports a five-fold increase in malicious advertising in the first half of this year. In the first half of 2016 malvertising-related blacklist incidents rose to 1.7 million – a total increase of 400 per cent from the same period in 2015 (368,000). In 2014 as a whole, RiskIQ tracked 250,000 incidents …
John Leyden, 03 Aug 2016

CloudFlare pros pen paranoid phone plan for pwn-free peregrination

Travelling executives should use modern iPhones with burner SIMs, no PINs, and minimal apps, CloudFlare security boffin Filippo Valsorda says. Valsorda of the anti- distributed denial of service attack firm's London office says his 'paranoid' guide focuses on iOS because he considers it the most secure operating system …
Darren Pauli, 08 Jul 2016
Tor

Lose the onion tears, Tor fanboys: CloudFlare may consider binning CAPTCHAs, says CEO

Tor users crying over CloudFlare's CAPTCHAs will soon be able to put away their onions, rather than their .onions, the company has suggested. CloudFlare CEO Matthew Prince told The Register he would love to create a no-more-tears system allowing the anonymizing network's legitimate users to access CloudFlare-hosted websites …
The Unha-3-2 launches from Sohae Satellite Launching Station in December 2012. Pic: Official North Korean image

Norks uses ballistic missile to launch silent 'satellite'

The UN Security Council has threatened North Korea with the terrors of the Earth after its weekend ballistic missile test. Meanwhile, radio hams are gearing up to work out whether the satellite's making any contact with Earth. Norks' launch, which also put a satellite into orbit, the Kwangmyongsong-4, which was detected by …
Royal Marine snipers practicing with AI .338 rifles

Are second-hand MoD IPv4 addresses being used in invoice scams?

Crooks appear to be taking advantage of the recent sale of the UK Ministry of Defence’s IPv4 address space to run more convincing scams. They have purportedly bought blocks of IP addresses with previously pristine records to distribute scams. This malfeasance was enabled, in part, because the relevant Whois database entries …
John Leyden, 14 Dec 2015
Interpol Logo

Virtualisation blog 'of interest to Interpol'

UPDATE VMware employee William Lam appears to have been denied entry to Europe. Lam touched down in Paris en route to VMworld Europe in Barcelona, but soon after landing Tweeted the following. *sigh* Apparently Interpol has an interest in virtuallyGhetto, not the good kind :( There's chance I might not make #VMworld — William Lam (@ …
Simon Sharwood, 12 Oct 2015
No junk mail. Pic: gajman, Flickr

The last post: Building your own mail server, part 1

Feature Email is one of those internet services that, like it or not, we all have to use. Yet the underlying protocols have been around since before the invention of spam (the electronic sort, of course), and have little in the way of protection. No junk mail. Pic: gajman, Flickr Internet email is far from perfect, but unless you …
Nigel Whitfield, 12 Sep 2015

GCHQ wants to set your passwords. In a good way

Britain's spy agency the GCHQ has changed its password security guidance in a new document offering sensible advice that, if followed, should harden systems and make life easier for admins and users. The guidance advocates a ban on password strength meters, mandatory resets, and predictable combinations, instead encouraging …
Darren Pauli, 11 Sep 2015
Pioneer Laserdisc player and projector from 1982

Sign of the telly times: HDR shines, UHD Blu-ray slides at IFA

Breaking Fad This year’s IFA gadget expo proved to be a chaotic platform for next generation TV technology. HDR (High Dynamic Range) gained traction, while 4K UHD Blu-ray took one step forward and two back. There were boys' toys and bluster a-plenty. Pioneer Laserdisc player and projector from 1982 This year's 4K telly tech is not quite …
Steve May, 10 Sep 2015

Data retention soggy with SPAM

Telcos will be required to retain data on spam, failed email, and borked voice over IP phone calls under the Australian Federal Government's looming data retention plan. Data retention comes into effect 15 October. It requires telecommunications providers retain metadata information on subscribers but not the content of …
Darren Pauli, 01 Sep 2015

Malware menaces poison ads as Google, Yahoo! look away

Feature Online advertising has become an increasingly potent threat to end-user security on the internet. More hackers than ever are targeting the internet's money engine, using it as a powerful attack vector to hide exploits and compromise huge numbers of victims. Malvertising, as poisoned ads are known, is as deadly as it is diverse …
Darren Pauli, 27 Aug 2015
virus_1_648

It's not just antivirus downloads that have export control screening

Export control screening for individuals hoping to purchase everyday consumer technologies extends beyond just antivirus software downloads, according to several sources contacted by The Register. Those who share the name of someone on a blacklist have to go through secondary screening (a bureaucratic process generally …
John Leyden, 13 Aug 2015

Blacklists miss 90% of malware blogged IP love

Threat intelligence firm RecordedFuture says popular web blacklists are missing thousands of IP addresses linked to malware data theft. The Massachusetts company, which boasts it's scored four out of five "top companies in the world" as clients, says correlating IP addresses to malware references yields between a thousand and …
Darren Pauli, 12 Aug 2015
Bookshelf in the British Library basement

Borg blacklist assimilates Cryptolocker domain name generators

Cisco has developed a means to accurately identify the fleeting pop-up domains used by some of the world's worst malware. The platform builds a reputation score that is in part based on word sources including more than 60 dictionaries, Census data and Alexa top 1000 domains. Using multiple sources helps to identify the …
Darren Pauli, 10 Aug 2015

Google, Facebook and chums launch web blacklist to nail ad scammers

Tech big wigs including Facebook and Yahoo! have forged a giant blacklist to block fake web traffic contributing to advertising fraud, said Google ad man Vegard Johnsen. The Trustworthy Accountability Group (TAG) pilot program will nix bot traffic using a blacklist which could cut a significant portion of web traffic; Google's …
Darren Pauli, 22 Jul 2015

Mozilla loses patience with Flash over Hacking Team, BLOCKS it

Mozilla has temporarily blocked Flash in Firefox while waiting for Adobe to release patches to fix yet more serious security holes in the Swiss-cheese-like plugin. These holes can be exploited by criminals to hijack PCs and infect them with malware; details of the bugs emerged from leaked Hacking Team files. Firefox began …
John Leyden, 14 Jul 2015
Circuit board underwear by emiko-o

Whoops, there goes my data! Hold onto your privates in the Dropbox era

Your users are probably using cloud-based services that you’re not even aware of to organise their files and collaborate with each other. What are you going to do about it? “Shadow” IT — cloud services bought from third-party providers without authorisation by the IT department — is becoming a significant problem for many …
Danny Bradbury, 24 Jun 2015
Empty racks awaiting customer kit at HP's Aurora data centre

Why carrier neutrality matters for 'proper hosting'

When you sign up for data centre services, it's easy to focus on the core stuff like uptime, cooling and cabinet availability, while forgetting that getting wide-area (private circuit or internet) links can sometimes be tricky. If you forget to examine how carrier-neutral your provider is, though, then you risk delays in moving …
Dave Cartwright, 08 May 2015
Avengers: Age of Ultron

Avengers: Age of Ultron – blisteringly big banter, brawls and brio

Film Review Marvel’s Avengers franchise is such a massive, behemoth of a marketing machine, such a merchandise-heavy, almost decade-long suction of talent, time and money that I want to hate it. I want to say, why don’t we spend all that money on independent films? Original stories? Something new, for God’s sake! But there’s just no denying …
Shopping trolley. Pic: Mikey, Flickr

Looking for laxatives, miss? Shoppers stalked via smartphone Wi-Fi

The FTC has now settled with a New York startup that stealthily tracks the movements of Americans around stores using their smartphones' Wi-Fi signals. The regulator alleged [PDF] in late 2013 that Nomi Technologies broke the FTC Act by not being totally upfront with shoppers. Nomi's Listen service is used by retail chains to …
Shaun Nichols, 24 Apr 2015

IWF took down over 31,000 child sexual abuse URLs in 2014

Last year saw a 136 per cent increase in identified and subsequently removed child abuse imagery, according to a just-released report from the Internet Watch Foundation (IWF). In its Annual Report for 2014, the body revealed that its new ability to actively seek out criminal content has been effective in allowing it to …
Xeon E7 die

US govt bans Intel from selling chips to China's supercomputer boffins

The US government has blocked Intel from shipping high-end Xeon processors to China's supercomputer builders – and other American chip giants are banned, too. Intel confirmed to The Register last night it was refused permission to sell the chips to the Middle Kingdom's defense labs and other parts of its supercomputing …
Iain Thomson, 10 Apr 2015

Using Office 365 at work? It's dangerous to go alone! Take this...

Microsoft is adding some security tools, dubbed Advanced Threat Protection, to Office 365 for its business and government subscribers. The utilities will try to curb malware writers and phishers seeking to exploit vulnerabilities via emailed attachments and links. "As hackers around the globe launch increasingly sophisticated …
Iain Thomson, 08 Apr 2015
All UK police forces use Tetra

Ex-cops dumped on never-hire blacklist for data misdeeds

The College of Policing has proudly informed the world that 59 former police officers, who were either sacked or resigned, have been placed on a blacklist barring them from re-entering the police service due to “data misuse”. Within a mere year of existing the “Disapproved Register” has already been graced with the names of …

Mozilla mulls Superfish torpedo

Firefox-maker Mozilla may neuter the likes of Superfish by blacklisting dangerous root certificates revealed less than a week ago to be used in Lenovo laptops. The move will be another blow against Superfish, which is under a sustained barrage of criticism for its use of a root certificate to launch man-in-the-middle attacks …
Darren Pauli, 23 Feb 2015

Fujitsu boss: UK's 2015 elections won't make any difference to us

Interview The UK government is unlikely to make any drastic changes to its IT acquisition strategy no matter who scrambles into Number 10 next May, the European boss of public sector IT giant Fujitsu predicts. Yet the Japanese-owned firm is still striving to ramp up its private sector business as part of its worldwide restructure put in …
Joe Fay, 10 Dec 2014
The MSN Santa (unconfirmed)

Google's elves work on Santa to rein(deer) in grinchware

Google's elves have been busy working on a toy for all the girls and boys who run Mac OS and worry about getting a virus. “Santa” is billed as “a binary whitelisting/blacklisting system for Mac OS X”, can be found on GitHub and “keeps track of binaries that are naughty and nice.” Nice binaries get to run. Naughty binaries get a …
Simon Sharwood, 25 Nov 2014
Costumed pirate

France to draft blacklist banning alleged piracy websites – what could POSSIBLY go wrong?

France looks set to increase funding and power for its controversial piracy-battling Hadopi agency. Hadopi started life as a law to stamp out the illegal sharing of copyrighted stuff – primarily by sending warning emails to people caught pirating movies, games, and so on: after three strikes, your ISP is supposed to boot you …
Jennifer Baker, 23 Oct 2014
Apple iPhone 6 and 6 Plus

Apple blacklists tech journo following explicit BENDY iPhone vid

Apple has allegedly blacklisted a German tech journalist who filmed a video that proved the new iPhone 6 Plus could be bent. Axel Telzerow, editor of Computer Bild, was determined to see if the new mobe could be persuaded to take on a more curved shape, only to be "shocked" to see how easy it was to buckle the already quite …
Jasper Hamill, 02 Oct 2014
putin topless

Work in the tech industry? The Ukraine WAR is coming to YOU

Anyone in tech who thinks that the conflict in Ukraine - which has been smoldering since the end of 2013 - is not their business should think again. At the weekend Russia was given one week by European Union chiefs to reverse course in the Ukraine or face new sanctions. Russia has been accused of interfering in Ukraine, …
Gavin Clarke, 04 Sep 2014
Steve Jobs, credit Apple site, screengrab

Silicon Valley tech titans beg for more mediation time in wage-fix lawsuit

Some of the biggest names in Silicon Valley have filed a court motion asking for more time in mediation before going to court to fight former employees who claim they were put on secret no-hire blacklists by their bosses. The class action suit claims that from 2005 the bosses of Adobe, Apple, Google, Intel, Intuit, Lucasfilm, …
Iain Thomson, 04 Sep 2014
Toy Story

Researcher details how malware gives AV the slip

Researcher James Wyke has discovered throw-off tactics used by malware to frustrate investigators. These tactics were part of a suite of impressive methods VXers used to find technical artifacts that could help them distinguish between computers belonging to victims and those used by malware researchers. While malware writers …
Darren Pauli, 26 Aug 2014
Precog Minority Report

Security precogs divine web vulnerabilities BEFORE THEY EXIST

Wayback is way ahead: Three million webpages are set to become hacker fodder according to research that could predict what websites will become vulnerable ahead of time. The research by Kyle Soska and Nicolas Christin of Carnegie Mellon University used an engine which divined the future by looking at the past - more specifically, by trawling the Way …
Darren Pauli, 22 Aug 2014
Good riddance to bad Java

Now even Internet Explorer will throw lousy old Java into the abyss

Internet Explorer will soon join its rival browsers by automatically blocking old, insecure add-ons – and it's got its eye set squarely on Java. Microsoft said on Wednesday that starting on August 12, Internet Explorer will begin alerting users when web pages try to launch ActiveX controls that are considered out-of-date and …
Neil McAllister, 07 Aug 2014

Major problems beset UK ISP filth filters: But it's OK, nobody uses them

Consumer takeup of network-level filters offered by the UK's biggest ISPs remains sluggish, with customers largely declining to censor internet content on their home connections even when prompted, an Ofcom report revealed today. The regulator found (PDF) that very few subscribers opt to turn on so-called parental controls. …
Kelly Fiveash, 22 Jul 2014
Canvas fingerprinting

NEW, SINISTER web tracking tech fingerprints your computer by making it draw

A new, persistent web-tracking technology developed has been used to track web users across many of the world's most popular websites, including those of the White House and even wholesale smut platform YouPorn. The canvas fingerprinting technique was described in 2012 by University of California researchers (PDF) as a means …
Darren Pauli, 22 Jul 2014
The chinese characters for China as used in the new .中国  domain

China blocks Flickr and OneDrive

China appears to have tweaked the Great Firewall to block Yahoo!'s Flickr photo-sharing service and Microsoft's OneDrive cloud storage offering. The timing of the blocks, reported by transparency monitoring outfit GreatFire.org, looks convenient inasmuch as Hong Kong this week saw substantial pro-democracy rallies in Hong Kong …
Simon Sharwood, 04 Jul 2014

ABANDON CLOUD! Docker Linux containers spring a security leak

A security exploit has surfaced that can allow rogue programs to break out of Docker containers and access files on their host OS, but the flaw has been sealed in the latest version of the tech. Unlike virtualization, which launches a separate operating system instance for every virtual machine, Linux containerization sticks …
Jack Clark, 19 Jun 2014
Spam

How do I escape this damned email blacklist?

Readers' corner Commentard m0rt writes in El Reg Forums: Someone who has a mailing account with one of my domains, which in turn is hosted on a mate's server, had his email password lifted from his XP laptop and subsequently that account was used to send out a near a million spam messages. Or attempted to, I caught it with 847k still to go. …
Drew Cullen, 24 May 2014

Apple, Google, Intel, Adobe, settle employee-fiddling class action suit

A series of secret pacts among some of the biggest employers in Silicon Valley to cheat their staffers could turn out to be a rather expensive mistake, with Apple, Google, Intel, and Adobe now agreeing to settle the antitrust class-action lawsuit out of court. "This is an excellent resolution of the case that will benefit …
Iain Thomson, 25 Apr 2014
Night scene of bank station in central london

EE & Vodafone will let you BONK on the TUBE – with Boris' blessing

London Underground commuters will soon be able to pay for Tube journeys via contactless credit cards thanks to EE, Vodafone and Transport for London. The pay-by-bonk system, currently undergoing trials, works by users charging a pre-payment wallet on their NFC-enabled phones and using it to pay for journeys. This sits between …
Simon Rockman, 23 Apr 2014
Oppo N1 CyanogenMod Edition

A premium smartie lump: Oppo N1 CyanogenMod Edition

Review While most Chinese smartphone OEMs started life making cheap tat and then slowly began moving upmarket, Oppo has taken a slightly different tack. Its devices have been fairly high-end from the get-go and the N1, initially released running Android 4.2 back in September 2013, made quite a splash. Oppo N1 CyanogenMod Edition …
Alun Taylor, 22 Apr 2014

Pakistan mulls cyber security bill to keep NSA at bay

Pakistan’s Upper House this week began debating a new bill seeking to establish a National Cyber Security Council, an agency the nation feels is needed in the wake of Edward Snowden's myriad revelations about NSA surveillance. The Cyber Security Council Bill 2014 was presented by Senator Mushahid Hussain Sayed on Monday with …
Phil Muncaster, 15 Apr 2014
The Four Horsemen Apocalypse ride up the grassy mound that adorns the WinXP desktop

The... Windows... XPocalypse... is... NIGH

Sysadmin Blog The XPocalypse is upon us, gentlebeings, and those of us who must keep XP around are doomed! Or so some very expensive marketing pushes would have us believe. As you know by now, I have to keep some XP systems around. In some cases they'll probably be around for a decade or more. If you believe the breathtaking hyperbole of …
Trevor Pott, 08 Apr 2014