Articles about Context

Snowden image

Snowden leaks lack context says security studies professor

With the wash-up from December's Snowden leaks still sloshing around the 'net, The Register decided to discuss how to interpret the leaked documents with Thomas Rid of King's College London. In November, Rid (Professor of Security Studies) and colleague Robert Lee (currently undertaking his PhD at King's) published a piece …
BB_PLAYBOOK_RIM_DOWN_TOILET

Notebooks drag PC sales out the toilet, fondleslabs still falling

The PC market bounced back in the first quarter of 2015, mainly thanks to a big uplift in notebook sales. According to research from tech distribution sales data compiled by Context, the market rose by seven per cent on the year. Notebook sales were up 26 per cent to 644,304, while desktop sales remained flat at 237,700, and …
Kat Hall, 01 Apr 2015
Lucoms PC-on-a-stick

Microsoft shows off South Korean PC-on-a-stick

What's 11 centimeters long, packs an Intel processor, weighs 46g, runs Windows 10 or 8.1, and is sticky? Come May, the answer to that question is the Lucoms PC-on-a-stick, at least in South Korea. Microsoft's outpost in Nice Korea yesterday threw a bash of some sort to talk up the Windows device ecosystem. And among the …
Simon Sharwood, 18 Mar 2015

Hey devs! Confused by EU privacy law? Pull out the FLASH CARDS

Microsoft and University of Nottingham researchers say developers should be taught to design privacy and security using flash cards if they find wordy regulation documents onerous. The team including Redmond's Ewa Luger and the University's Lachlan Urquhart, Tom Rodden, and Michael Golembewski say regulation is out-of-touch and …
Darren Pauli, 06 May 2015
Li-Fi D-Light

Fridge hacked. Car hacked. Next up, your LIGHT BULBS

Those convinced that the emerging Internet of Things (IoT) will become a hackers' playground were given more grist for their mill with news on Friday that security researchers have discovered a weakness in Wi-Fi/mesh networked lightbulbs. Researchers at Context Information Security discovered that LED light bulbs from …
John Leyden, 07 Jul 2014
Doom printer hack

Infosec geniuses hack a Canon PRINTER and install DOOM

Security researchers have demonstrated a hack that allowed them to get into the web interface of a Canon Pixma printer before modifying its firmware to run the classic 90s computer game Doom. The proof-of-concept demo by security researchers at Context Information Security, which involved remotely accessing the web interface on …
John Leyden, 15 Sep 2014

Retailers toast welcome return of Back2School notebook biz

The Back2School sales fest that deserted the retail notebook industry a year ago has returned with a bang… sort of. According to distie sales numbers crunched by Context, shipments across Western European wholesalers jumped 12.5 per cent in the first two months of Q3 and were up 17.5 per cent in the UK. The sales are flattered …
Paul Kunert, 12 Sep 2014

Microsoft stands on shore as tablet-laden boat sails away

The good citizens of Britain are still giving Windows 8 and 8.1 fondleslabs a wide berth, official figures from disties has confirmed. More than 596k slate tabs were shipped out to UK resellers and retailers in Q2, up 27.8 per cent year-on-year with the vast majority of them (nearly 406k) were running on Google’s Android …
Paul Kunert, 30 Jul 2014

Death knell for Windows with Bing, licences carved up

Microsoft is effectively killing off the Windows with Bing notebook market less than a year after it was created. The low-cost portables released last summer were Redmond’s competitive response to Google’s Chromebook, giving PC OEMs the Windows OS licence at a heavily discounted rate, and consumers responded positively. However …
Paul Kunert, 11 Feb 2015
Toshiba Encore Windows 8.1 tablet

Windows tablet price war FINALLY has 'em prying open wallets

Microsoft is, er, fighting back in the UK tab tussle stakes after grabbing market share from OS rivals, although the small victory could be seen as a bit hollow. According to Q4 tech distie sales data compiled by Context, a little over 120,000 Windows 8/8.1 fondleslabs were shifted to customers - 8.3 times more than the …
Paul Kunert, 28 Jan 2015
curiosity shadow

How big a problem is Cloud security?

To help readers help each other, we have put together a short, sharp temperature check survey on the topic of cloud security. We're asking a bit about you and your organisation for context and then 5 simple questions that we think nail the key issues and possible solutions. We finish off by getting you to tell us the scariest or …
Dale Vile, 13 Apr 2015
Stained glass angels

Gods of tech distribution smile on Blighty in Q1

Distributors in almost half of the countries across Western Europe failed to register sales growth during Q1 but those with ops in Blighty were not among them. Sales out data from Context reveals UK market revenues climbed 12.4 per cent in the three months to €2.5bn, making it the largest sector in the region for the past four …
Paul Kunert, 06 May 2014
The tag in question

Shove over, 2FA: Authentication upstart pushes quirky login tech

Security upstart LiveEnsure is trying to shake up the authentication market with technologies that verify users by device type, location and user behaviour, as an alternative to established authentication systems. The firm is pushing its smartphone-based services as an alternative to security tokens, biometrics, one-time- …
John Leyden, 07 Nov 2014
Intel PC Group General Manager, Mooly Eden

Intel laptop boss to make Ultrabooks context savvy

IDF 2011 Pundits have been talking about building GPS and other sensors into notebooks for some years. Now it may actually happen. Optional for the moment, Intel is planning to mandate the addition of a variety of sensors into its Ultrabook spec. Speaking after his IDF keynote today, Intel's PC Group chief, Mooly Eden, said he wants …
Tony Smith, 14 Sep 2011
ITU logo

ICT ministers mark out net-regulation patch ahead of ITU plenipot

The ITU has kicked off three weeks of wrangling over the future of the Internet – the 2014 Plenipotentiary – with a ministerial statement that's likely to spark concerns about the direction of the coming summit. The Busan Declaration, issued at the close of the Busan ICT ministerial meeting, is filled with high-minded language …

Malcolm Turnbull proposes taxing Google and Facebook ads

Australia's Communications minister Malcolm Turnbull has his eye on the revenues collected by multinational online ad platforms like Google. Apparently raising a white flag on the government stopping multinationals from shipping profits offshore to avoid tax, Turnbull has floated the idea of levying Australia's goods and …
Open-mouthed Burmese python

Oracle releases antidote for VENOM vulnerability

Oracle has released patches for its virtualisation software to crimp the VENOM vulnerability that allows attackers to break out of virtual machines to attack hosts. The company follows a host of others including KVM and Xen which have patched the buffer overflow bug. VMware, Microsoft, and Bochs are immune to the problem. …
Darren Pauli, 19 May 2015

Brit enterprises still wolfing down PCs post-XP support death

Tech disties feasted on a relative PC sales banquet in Q2 as businesses and to a lesser extent consumers made a belated dash to rid themselves of systems running on Windows XP. Abacus stroker Context collated the sale-out figures from wholesalers and found more than 844k desktops, notebook and PC workstations were adopted by UK …
Paul Kunert, 15 Jul 2014

Hackable intercom lets you SPY on fellow apartment-dwellers

Kiwicon Kiwi hacker Caleb "alhazred" Anderson has popped a video intercom device that could have allowed him to spy on the 700 apartments in his building. The GrandStream GXV3175 intercom unit has been patched after Anderson - who by day serves as Context Information Security's lead consultant - began the attack while "inspired" by a …
Darren Pauli, 12 Dec 2014
Facebook privacy image

Facebook cosies up to ESET for malware detection

Facebook, which earlier this year started partnering with F-Secure and Trend Micro for malware detection, has added Slovak vendor ESET to its suite of security products. The previous tie-ups, detailed here, are worth noting to put the new partnership in context. F-Secure and Trend both pointed Facebook users at their free online …
Russia

Russia's Putin IT spend in reverse gear, fast

When the first dotcom bubble popped, the likes of EMC, Sun and Oracle didn't panic that the days of easy greenfield sales were over because the then-burgeoning economies of eastern Europe gave them new greenfields in which to romp. Russia, in particular, modernised quickly and became a decent-sized market for enterprise IT. But …
Simon Sharwood, 20 Mar 2015
Bubblecar Bond MkD

Messerschmitts, Sinclairs and a '50s living room: The Bubblecar Museum

Review Sir Alec Issigonis' Mini may, perhaps, be the most famous of British small cars, and the Fiat 500 one of the most well known continental ones, but before either of those appeared, came plenty of other tiny vehicles, aimed at providing transport on a budget to people across Europe. With engines as small as 122cc, often only three …
Nigel Whitfield, 16 May 2015

Cisco makes ACI control more programmable

Cisco has released a command-line toolkit for its Application Centric Infrastructure (ACI), freeing sys admins from the tyranny of the GUI. The company describes its ACI Toolkit as a combination of “an NX OS-like CLI and some custom Python scripts” that cover the most common daily configuration and admin tasks. The toolkit also …

Lenovo sings distie initiation song, adds Westcoast to line-up

Industry eyes may be on Lenovo’s swollen server digits after wolfing down IBM’s System x biz but the Chinese dragon is upping the numbers in its PC distie ranks to pull in more sales across Blighty. Reading-based Westcoast today took on the professional side of the portfolio, adding to the Lenovo consumer clients it already …
Paul Kunert, 12 Jan 2015
Boeing's CST-100 space capsule

Big Yellow brings in Boeing bods to bolster Big data bid

Symantec is acquiring 65 security engineers from Boeing as a part of a deal to beef up its expertise in Big Data, prior to a split between its security and storage divisions later this year. As part of the deal Big Yellow is also licensing technology from Boeing's Narus security division, which develops network-monitoring …
John Leyden, 13 Jan 2015

Speaking in Tech: Cloud, Ellen Pao and ... er, Jeremy Clarkson

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hello, good morning, and welcome to another edition of Speaking in Tech, hosted by our old friends Greg Knieriemen and Ed Saipetch. Sarah Vela is out of the loop this week but will be back soon. This week we scratch the surface of the Ellen Pao lawsuit (what did it actually …
Team Register, 01 Apr 2015
gavel_judgment_channel

Microsoft chucks patent sueball at Kyocera over Android phones

Microsoft has filed for an injunction to ban Japanese mobe-maker Kyocera from selling its Duraforce, Hydro and Brigadier phones in the US, alleging a breach of its Android patents. The Redmond-based software giant asked the US federal court in the Western District of Washington to impose an injunction against Kyocera, based on …
Simon Rockman, 09 Mar 2015
ONOS Logo

ONOS to SDN world: here's our numbers, show us yours

The ONOS (Open Network Operating System) software defined networks project has shipped the second iteration of its code, and with it hopes to encourage the SDN controller sector to start publishing detailed performance metrics. Prajakta Joshi, director of products at ON.Lab, told The Register that while SDN is seeing strong …
United Airlines Boeing 757. Pic: Aero Icarus

Feds: Bloke 'HACKED PLANE controls' - from his PASSENGER seat

The FBI has accused an infosec security researcher of hacking into the controls of a United Airlines plane in midair via the inflight entertainment system, causing the aircraft to temporarily fly "sideways". Infosec chap Chris Roberts allegedly made that audacious claim to special agent Mark Hurley of the FBI, who subsequently …
Kelly Fiveash, 17 May 2015
Sydney Opera House Hackathon logo

Liberal MP threatens journo with metadata probe

Mere weeks after Australia's government passed its metadata retention laws, a junior minister has - perhaps jokingly - threatened to use them against a journalist. The minister in question is Jamie Briggs, member for the South Australian seat of Mayo and assistant minister for infrastructure and regional development. Briggs …
Simon Sharwood, 06 Apr 2015
Facepalm by Ron Mander

VMware wins cool reception for two-CPU eval software

VMware has kicked off a new program that looks like it will make it easier to build home labs. Mostly. The new EVALExperienence program is pretty simple: cough up the US$200 required to become a member of the VMware user group (VMUG) Advantage program and you'll find yourself able to download and run vCenter Server, vSphere with …
Simon Sharwood, 18 Jan 2015
Close-up of the flu virus (artist's impression) - Shutterstock

Google unleashes tame botnet to hunt XSS in cloudy code

Google has unleashed its own application security scanner, potentially rescuing admins from 'fiddly' existing offerings. The scanner will check code running in App Engine for cross-site scripting (XSS) and mixed content vulnerabilities. Choc Factory engineering head Rob Mann says its scanner uses its Compute Engine to forge a …
Darren Pauli, 20 Feb 2015

Facebook 'fesses up to running an ideological echo chamber

Science has published research conducted by two Facebook staffers and one academic from the University of Michigan on “Exposure to ideologically diverse news and opinion on Facebook.” The research seeks to explore “speculation around the creation of 'echo chambers' (in which individuals are exposed only to information from like- …
Simon Sharwood, 08 May 2015
Traffic cones by Squire Morley. licensed under creative commons 2.0 https://creativecommons.org/licenses/by/2.0/

Video nasty: Two big bugs in VLC media player's core library

A Turkish hacker has revealed two zero-day vulnerabilities in library code used by the popular VLC media player and others. The data execution prevention (CVE-2014-9597) and write access (CVE-2014-9598) violation vulnerabilities could lead to arbitrary code execution, researcher Veysel Hatas said in a post. "VLC Media Player …
Darren Pauli, 20 Jan 2015

Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack

It costs a whopping $3.1m to defend against a $100,000 advanced attack, a security duo claims. The imbalance - well-known to security pros - was illustrated in research presented by Microsoft security strategist Paul McKitrick and founder of security startup ICEBRG William Peteroy (@wepiv) at the Kiwicon hacker fest in …
Darren Pauli, 18 Dec 2014

Tech disties: What the HELL happened to our sales growth in Q1?

Tech disties’ sales growth across Europe almost halved in Q1 as the XP migration factor ran out of steam, PC business dwindled and weaker demand for Apple slabs and IBM big iron came to bear. The quarterly figures – based on sales-out data from the suppliers – collated by Context’s SalesWatch tracker, indicate turnover from the …
Paul Kunert, 11 May 2015

NetApp shows hybrid love, revamps products for Amazon's cloud

NetApp is cosying up even more to Amazon in pursuit of its hybrid cloud data fabric ideas. What it’s doing is this: Adding three SteelStore cloud-native backup products as Amazon Machine Images (AMI) to backup cloud-based workloads, taking on EMC'S newly acquired cloud app firm Spanning. On-premises SteelStore physical …
Chris Mellor, 25 Feb 2015
Samsung pre-announces Office 365 deal with Microsoft

Samsung-Microsoft deal will bundle Office 365 with Android Knox

MWC 2015 The man behind Samsung Knox, Dr Injong Rhee, says a deal with Microsoft will see Office 365 bundled with the Knox secure enterprise workspace. Rhee was speaking at Samsung’s Enterprise Mobility Showcase, part of Mobile World Congress in Barcelona. Knox is a secure container built into Samsung’s Android devices. It includes both …
Tim Anderson, 04 Mar 2015
Netflix FIDO logo

Netflix looses FIDO hack attack dog as open source

Netflix has released source code for its automated incident response tool to help organisations cut through the noise of security alerts. Project lead and security boffin Rob Fry together with Brooks Evans, and Jason Chan announced the unleashing of the Fully Integrated Defense Operation (FIDO) saying it has chewed the time to …
Darren Pauli, 05 May 2015
The Register breaking news

Unified communications in context?

Webcast We've seen from Reg research that a lot of you have considered and are exploring the notion of unified comms so we’ve been trying to do some work on your behalf. Last week we got a whole range of end users and experts in the field of unified comms to do a series of videos on the challenges, benefits and management of such …
Team Register, 25 May 2010
Telstra phone booth by Ed Dunens from Flickr https://www.flickr.com/photos/blachswan/

Telstra to let customers access their own metadata for AU$25

Australia's dominant carrier, Telstra, will give its customers the chance to access their metadata, for a fee. The new policy, explained in a post from chief risk officer Kate Hughes, is based on the principle that “offering the same access to a customer’s own metadata as we are required to offer to law enforcement agencies.” “ …
Simon Sharwood, 06 Mar 2015
The Register breaking news

Big Data in Context

Big Data is an ‘umbrella’ term that is commonly used to refer to a number of advanced data storage, access and analytics technologies aimed at handling high volume and/or fast moving data in a variety of scenarios. These typically involve low signal-to-noise ratios, such as social media sentiment monitoring, or log file analysis …
Colin Beveridge, 16 Jan 2012
Netflix House of Cards remake

Optus joins iiNet with free-to-download Netflix offer for Australians

Australia's second-largest ISP Optus has followed the third-largest, iiNet, by announcing Australians will be able to watch Netflix without the downloads counting towards their monthly data cap. The announcement places pressure on Australia's dominant carrier, Telstra, to do likewise. But as Telstra is a major shareholder in …

Facebook is MORE IMPORTANT to humanity than PORTUGAL

Facebook has paid a bunch of consultants to make the dubious claim that the free-content ad network's worldwide economic value is far greater than the billions of dollars in sales it drums up each year. If figures from Deloitte are to be believed, Mark Zuckerberg's ego was stroked to the tune of $227bn, based on the assertion …
Kelly Fiveash, 20 Jan 2015
IBM_Spintronics

Graphene spintronics crowned latest Moore's Law extender contender

Wonder material graphene could provide the basis for the future of circuitry, by using a technique known as spintronics, boffins have mused. Spintronics uses the spin of individual electrons as the encoding method for data. This is significantly smaller than using charge, which requires thousands of electrons. Unfortunately, …
Simon Rockman, 16 Apr 2015
Monopoly testing

You, El Reg and a doctor walk into a Monopoly Pubcrawl chinwag

Live Chat You've no doubt been enjoying El Reg's scintillating coverage of our magnificent 3G/4G data Monopoly pub crawl, so now's your chance to quiz GWS chief Dr Paul Carter on the whole shebang. On Friday 29 August, we held a live chat with the man himself, to explain the decisions that were made in testing and to look at some of the …
Simon Rockman, 25 Aug 2014
What Linus Torvalds thinks of NVIDIA

Nvidia's GTX 900 cards lock out open-source Linux devs yet again

The Linux community's on-again, off-again relationship with Nvidia appears to have soured once more, amid reports that the GPU maker is back to its old tricks – and worse – when it comes to open source hardware drivers. Nvidia does release Linux drivers for its graphics cards, but they are proprietary and ship in binary-only …
Neil McAllister, 15 Apr 2015
Turnbull with Switkowski in Blacktown

National Broadband Network names cable broadband trial sites

Three Queensland and one NSW locales will find out whether NBN Co's promise of downloads at 100 Mbps over hybrid fibre-coax (HFC) survives peak-hour traffic, after the company responsible for building Australia's National Broadband Network (NBN) announced trial sites of the delivery medium. In Queensland, Merrimac, Slacks Creek …

Revenge porn forbidden: Twitter bans hobby of bitter ex-boyfriends

Twitter has formally banned its users from posting intimate photos of people without their permission. It's a move that will hopefully rid the site of "revenge porn," which are typically sexy snaps leaked online by bitter ex-partners, usually spiteful former boyfriends. The 140-character chatterbox site has updated its rules of …
Shaun Nichols, 12 Mar 2015
US Military hacking team

Cyber-whizs partake in mass eye-roll event over latest leaks: CIA spies 'spying on iPhones'

CIA brainiacs at least thought about, or experimented with, breaking the security of Apple's iPhones, iPads and OS X computers, it appears from leaked intelligence documents. The intel agency wanted to crack the encrypted firmware stored on targeted iThings, and spy on selected users via poisoned apps, Snowden newsletter The …
John Leyden, 11 Mar 2015