Articles about Counterfeit

Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button

Security researchers will demonstrate how crooks can break into cars at will using wireless signals that can unlock millions of vulnerable vehicles. The eggheads, led by University of Birmingham computer scientist Flavio Garcia alongside colleagues from German engineering firm Kasper & Oswald, have managed to clone a VW Group …
John Leyden, 11 Aug 2016
Newly passed out 2Lts from 6 RIFLES on Salisbury Plain Training Area. Crown copyright, 2013

US military's fake chips battle

The US Department of Defense (DoD) has passed new rules designed to weed out the use of counterfeit hardware. Worried that fake gear such as chips or antenna parts could prove unreliable or pose a security risk (for example, be equipped with spyware by a foreign government), the DoD rules that government organizations and …
Shaun Nichols, 05 Aug 2016

Malaysia-based credit card fraud ring broken, 105 arrested

A total of 105 credit card fraud suspects have been arrested in Asia and Europe following a complex months-long investigation across two continents. The investigation targeted a gang led from Malaysia whose tentacles spread into 14 European countries (including the UK and Germany) and specialised in using counterfeit credit …
John Leyden, 08 Jul 2016
Lawyer up

Broker DP Data shuts up shop after HP's lawyers took a bite out of them

Grey broker DP Data Systems is facing a trademark infringement case brought by Hewlett Packard that ultimately convinced management to pull down the shutters, the business has claimed in its latest financial filing. As exclusively revealed by El Reg, the Manchester based wholesaler of HP, Cisco, IBM, Juniper and Lenovo shut up …
Paul Kunert, 30 Jun 2016

Objective-C can fly the COOP, says subversive at Microsoft Research

Objective-C programmers should use message authentication codes to protect sensitive objects and data structures, according to research presented to this week's Usenix Annual Technical Conference (ATC). A Microsoft Research staffer, and software researchers from UC Irving in America and folks in Germany focused on a technique …
Image by Dr Flash http://www.shutterstock.com/gallery-182053p1.html

Malaysians using South African cards pinch US$12.7m in Japan

Carders have made off with US$12.7 million (£8.7 million, A$17.5 million) ripping through 1400 ATMs in a mere two hours last week. The attackers netted ¥1.4 billion in cash from ATMs located in convenience stores across the country using counterfeit credit cards. Sources told local media the 1600 credit cards used in the …
Darren Pauli, 23 May 2016

First ATM malware is back and badder than ever

Cybercriminals have retrofitted a strain of ATM malware first discovered in 2009 to create an even more potent threat. Skimer was the first malicious program to target ATMs*. Seven years later, Russian cybercriminals are reusing the malware – but both the crooks and the program have evolved, to pose an even more potent threat …
John Leyden, 17 May 2016
Fat Tony

Google kneecaps payday loan ads

Google says it will no longer serve ads for short-term loan services it considers to be predatory lenders. The Chocolate Factory says that as of July 13, it will no longer be taking ads from loan services that seek repayment within 60 days or carry an annual percentage rate (APR) of 36 per cent interest or higher. The aim, …
Shaun Nichols, 11 May 2016

Prof squints at Google's mobile monopoly defence, shakes head

Analysis Google says that its tight control over Android is necessary to keep Android great, and safe for consumers, adding that it's not all that heavy-handed. Honest. Google feels hard done by because it has created a market of alternatives to Apple’s costly and proprietary iPhone, and that ecosystem benefits consumers. There’s no …
Andrew Orlowski, 20 Apr 2016
Prison

Chinese con-artists cop to US military counterfeit chip switch caper

Chinese national Daofu Zhang has pleaded guilty to conspiring to buy top-end field-programmable gate arrays (FPGAs) stolen from a US Navy base and replacing the swiped silicon with counterfeit duds. Last Friday, in Connecticut's New Haven federal court, Zhang, 40, admitted offering to purchase military-spec chips from a US …
hacker

What exactly is it that infosec miscreants get up to? A quick overview

If corporate IT infrastructures are a battlefield, then the cybercriminals are putting up a good fight. Last year saw some nasty breaches. Anthem Insurance, which lost nearly 80 million records, and the US Office of Personnel Management, which lost 21 million records after failing to encrypt its records. Cybercriminals are …
Danny Bradbury, 13 Apr 2016
google_vs_ms_648

Google ads probe blow

Google's attempt to shut down a probe by Mississippi Attorney General Jim Hood has been blocked by a US appeals court. Hood, along with other state prosecutors, wanted to investigate whether or not Google was complying with a $500m settlement with the US government. As well as coughing up the chunk of change, the web giant …
Chris Williams, 11 Apr 2016

Cyber-underworld price list revealed: $500 for company email inbox, $1,200 passports, etc

The underground bazaars for stolen online identities, access to corporate email inboxes, and fake ID are booming, we're told. Research by Dell SecureWorks says the market for underground hacking is increasing, particularly in Russia. Russian hackers are expanding their working hours and using guarantors to ensure customer …
John Leyden, 08 Apr 2016

Blighty starts pumping out 12-sided quids

The Royal Mint has begun pumping out the fetching 12-sided pound coins which will hit the UK's streets in March next year. The retro-styled nugget - which pays homage to the classic threepenny bit - is rolling off the production line at the rate of 4,000 a minute. It's heralded as "the world’s most secure coin in circulation …
Lester Haines, 01 Apr 2016

The Pirate Party finds a friend: A-G backs member against Sony

The Attorney General advising the European Court on a case that pits a Pirate Party member who operated a public, password-free Wi-Fi network in Munich, has sided with the Pirate. Professor Maciej Szpunar’s opinion isn’t the law, but is often influential in advising the Court’s ultimate decision. Sony discovered the Wi-Fi …
Andrew Orlowski, 16 Mar 2016

90% of SSL VPNs are ‘hopelessly insecure’, say researchers

Nine in 10 SSL VPNs use insecure or outdated encryption, putting corporate data at risk in the process, according to new research. High-Tech Bridge (HTB) conducted large-scale Internet research on live and publicly-accessible SSL VPN servers. The firm passively scanned 10,436 randomly selected publicly available SSL VPN …
John Leyden, 26 Feb 2016
Banned

BT, Sky, EE, TalkTalk and Virgin to appeal website blocking ruling

The Court of Appeal in London must maintain the right of brand owners to obtain website blocking orders against internet service providers as a means of enforcing their trade mark rights against infringers, an expert has said. The Court is expected to hear an appeal by BT, Sky, EE, TalkTalk and Virgin in April against a 2014 …
OUT-LAW.COM, 25 Feb 2016
Sidewalk mobile phone lane in China

FTDI boss hits out at 'Chinese criminal gang' pumping knock-off chips

FTDI's CEO Fred Dart has given a rare interview to explain that the company's sometimes-unpopular anti-counterfeiting practices are part of a fightback against a professional Chinese knock-off operation. Adafruit scored the chat, which is published here. Scotland-based FTDI ran into users' ire last year when people found its …
Counterfeit FTDI USB-to-serial adapter chips

Chip company FTDI accused of bricking counterfeits again

Semiconductor company Future Technology Devices International (FTDI), which in 2014 was caught out bricking products built using knock-off chips, has again been accused of fooling around with device drivers. Back in October 2014, the company shipped a device driver that checked the authenticity of USB chips claiming to be FTDI …

If you can't buy bootleg gear online in New York, this may be why

Usenix Enigma A university sleuth investigating online bootleggers has spoken of his research into counterfeit markets – including revealing the moment he accidentally blocked off a chunk of Manhattan to scammers. Understanding the money trail behind illicit internet businesses has been a passion of Damon McCoy, an assistant professor of …
Iain Thomson, 26 Jan 2016

That one weird trick fails: Google binned 780 million ads last year

Google blocked 780 million malicious and annoying advertisements last year, up from 256 million in 2014. The company says it has destroyed more than 10,000 sites foisting software like download wrappers, which install adware and the like. This, it says, reduced the total unwanted downloads through Google ads by 99 percent. …
Darren Pauli, 22 Jan 2016

Brazilian whacks: as economy tanks, cyber-crooks samba

Brazil's economy may be hurtling towards recession but its online criminal underground is booming with wannabe hackers and carders racing to get a cut, research finds. Trend Micro's work is the latest in a series of papers it has published in recent months that examine regional online crime economies including North America, …
Darren Pauli, 13 Jan 2016

50c buys you someone else's password for Netflix, Spotify or ...

Criminals are selling 'lifetime' Netflix, HBO, and cable sports streaming accounts for less than US$10 on sites hidden within Tor. Premium sports accounts sell for about $10 while streaming TV can be bought for as low as 50 cents, far less than the $10 monthly subscription. Comic fans can buy a stolen Marvel Unlimited …
Darren Pauli, 02 Dec 2015
'Broken Copyright' StockMonkeys.com

Team America, world police, take down 37,479 counterfeit sites

A band of merry world police lead by the United States Customs and Border Protection service shut down 37,479 copyright-infringing websites hawking counterfeit goods in the lead up to the Cyber Monday buying blitz. The takedown involved varying forms of collaboration between 27 countries including the Britain, France, Denmark …
Darren Pauli, 01 Dec 2015

So why exactly are IT investors so utterly clueless?

Something for the Weekend, Sir? Are you thick or what? No, really, how else can you explain why you invest vast sums of money on daft schemes that nobody wants? Long-time readers of this column may remember my little Tech City adventure a while back, in which I managed 2,000 sq ft of chic hipster office floorspace in the heart of London’s so-called "silicon …
Alistair Dabbs, 27 Nov 2015

UK/China cyber security deal: National security attacks still OK, it seems

Contrary to several trigger-happy reports, China's president Xi Jinping has not signed a formal agreement with the UK prime minister David Cameron on cyber security. Rather, the nations have issued a joint statement – which UK government spokespersons did not want to tell The Register was legally binding – which mentions an …

Of course you can text and call while driving – it's perfectly safe

We are often lectured not to talk or text while driving, yet increasingly, our cars are doing it all the time. The connected car is finally here, and it is the ultimate distracted driver. While getting you from A to B, it is also monitoring its own tyre pressure and adjusting its suspension accordingly. It is ready to call the …
Robin Birtstone, 21 Oct 2015

XcodeGhost attack tapped into dev distaste for Apple's Gatekeeper

In light of XcodeGhost, the number of malware-laden iOS apps is focusing attention on how developers were tricked into using dodgy code in the first place. The Xcode development tools used by iOS app makers were copied, modified and distributed online before (mainly) Chinese developers used the counterfeit code to compile apps …
John Leyden, 23 Sep 2015

Apple cleans up iOS App Store after first big malware attack

Apple is cleaning up its official iOS App Store after the first large-scale attack on its walled garden mobile software site. The Xcode development tools used by iOS app makers was copied, modified, and distributed online, by hackers to inject malicious code into apps available on the App Store, as previously reported. Palo …
John Leyden, 21 Sep 2015
A garden gnome depicted stretched out across picnic table... with a pipe in one hand while the other props him up. Has a confrontational look in his eye...

Pirate MEP: Microsoft's walled garden is no consumer pleasure park

Microsoft is trying to create its own “walled garden”, much to the detriment of consumers, Pirate Party MEP Julia Reda has told El Reg. Reda was referring to the new unified Microsoft services policy, which came into force at the beginning of this month and covers almost all of the tech goliath’s consumer services. In it, …
Jennifer Baker, 19 Aug 2015
Osborne 1, second version - DRAM detail

Is that a graphics driver on your shop's register – or a RAM-slurping bank card thief?

Crooks are infecting sales registers running Oracle-owned MICROS software with malware tailor-fitted to steal bank card information from the machines. MalumPoS scrapes sensitive data from the RAM inside the tills, which are used in places from shops and restaurants to hotels and bars. The software nasty can be easily modified to …
John Leyden, 09 Jun 2015

Fake Cisco box pushers cuffed by Intellectual Property Police

A London-based criminal outfit suspected of flogging $10m (£6.6m) in counterfeit Cisco networking gear to the US has been arrested by the City of London Police Intellectual Property Crime Unit (PIPCU). Three men aged 38, 36 and 35, were arrested last week by City police on suspicion of running the counterfeit business. An …
Kat Hall, 07 May 2015

Intellectual property laws in China, India are flawed, claims US govt without irony

The US government is looking to shame China and India for their lax attitudes toward intellectual property law enforcement. The office of US Trade Representative Ambassador Michael Froman said in its annual Special 301 report [PDF] that the two Asian nations were among the worst at snuffing out counterfeit goods. The two …
Shaun Nichols, 02 May 2015

Google Password Alert could be foiled with just 7 lines of JavaScript

Google has been obliged to revise its Password Alert anti-phishing protection just hours after releasing it when security researchers showed how the technology was easily circumvented. Security consultant Paul Moore (@Paul_Reviews) has published a proof-of-concept JavaScript exploit that skirted the defensive technology with …
John Leyden, 01 May 2015
Man in an orange jumpsuit clutches prison bars. Image by Shutterstock

Bloke, 22, in knockoff Microsoft Xbox ring gets 18 months in the cooler

A 22-year-old member of a games-hacking ring that sold counterfeit Microsoft's Xbox One consoles could spend the next year and a half behind bars in America. A US court sentenced Canadian David Pokora to 18 months in the slammer for his involvement in a group accused of stealing an estimated $100m to 200m worth of source code …
Shaun Nichols, 24 Apr 2015
Samsung Galaxy S5

Got a Samsung Galaxy S5? Crooks can steal your fingerprint – claim

RSA 2015 Malware can snaffle fingerprints used to unlock Samsung Galaxy S5 smartphones thanks to a security blunder, researchers claim. The vulnerabilities, due to be discussed at the RSA security conference in San Francisco this week, may be present in non-Samsung Android mobiles, too. Today's smartphones recognize their owners' …
John Leyden, 23 Apr 2015

How a hack on Prince Philip's Prestel account led to UK computer law

This week marks the 30th anniversary of arrests in the infamous Prestel hack case. It led to arrests, breached the Royal Family's security and helped give birth to the UK's first computer crime law. What began as a hack against the Prestel Viewdata system – which opened up access to Prince Philip's mailbox – later led to the …
John Leyden, 26 Mar 2015
Fake Apple Watch

Can't pay $349 for an Apple Watch? Get a Chinese knockoff for less than $50

China's legendary counterfeit craftsmen have been quick on the draw and are selling rip-off Apple Watch lookalikes for a fraction of the price, even though Cook & Co haven't shipped any devices as yet. "These guys are specialists," Laurent Le Pen, founder of Shenzhen smartwatch maker Omate, told CNN. "The speed at which they can …
Iain Thomson, 10 Mar 2015
Apple phone payement.

Apple Pay a haven for 'rampant' credit card fraud, say experts

Apple and its banker pals may have inadvertently lowered the barrier to credit card fraud by adding pay-by-wave technology to iPhones, security experts fear. Payment cards can be added to Apple Pay by taking a photo of the card, and allowing a device to run optical character recognition over the image to fill out the long card …
John Leyden, 03 Mar 2015
China censorship

China demands real names online, bans parody accounts and news article comments

From March 1, people in China must reveal their real names before they can join social networks and use other websites – or face cyber-exile. The ban on pseudonyms, plus the removal of reader comments from web articles, is a further crackdown on privacy and freedom of speech in the Middle Kingdom. According to the Cyberspace …
Iain Thomson, 04 Feb 2015
alibaba logo

Alibaba's magic cave empties as it misses revenue target

Chinese online tat bazaar Alibaba has not only posted disappointing results, been caned by the stock market but now has also fallen foul of China's government for knowingly hosting sellers of counterfeit kit. The company reported that it earned $964m for the last quarter of 2014 on revenue of $4.22bn. The earnings number was …
Simon Sharwood, 30 Jan 2015
BUS SPOTTERS SPOT BLUESTAR

Islamic script kiddies aim killer blow - at Bristol bus timetable website

Bristol residents looking for bus and train timetables were confronted by a message from Islamic militants following a defacement of the TravelWest website. A self-styled "Arab Security Team" called Darkshadow sprayed digital graffiti on Bristol-based travel information website www.travelwest.info. Local reports speculate that …
John Leyden, 02 Jan 2015

The Reg's review of 2014: Naked JLaw selfies, Uber and monkey madness

Facebook buying WhatsApp for nearly as much as Hewlett-Packard spent on Compaq in 2001? Well, 2014 was the year of the selfie, after all. Just don't let that snapshot of your bits get hacked. Leaked naked smartphone pics weren't this year's only embarrassing public spectacles: Microsoft's CEO put his foot in his mouth on women …
Gavin Clarke, 28 Dec 2014
Fraud image

Webcam-snooping spawn of ZeuS hits 150 banks worldwide

The latest evolution of the online bank account raiding Trojan ZeuS is the webcam-spying Chthonic malware, according to researchers. Chthonic infects Windows PCs, and allows criminals to connect to the compromised PC remotely and command it to carry out fraudulent transactions. The software nasty is targeting customers of more …
John Leyden, 19 Dec 2014

Roll up, come see the BOOMING HACKER BAZAAR!

Underground hacker markets are booming with counterfeit documents, premiere credit cards, hacker tutorials, and "complete satisfaction guarantees", according to a new report from Dell SecureWorks. The means to create a false identity are easily purchased through the cracker bazaars. A fake social security card can be obtain for …
John Leyden, 15 Dec 2014
Brute force

Home Wi-Fi security's just as good as '90s PC security! Wait, what?

UK home Wi-Fi security is as bad as PC security was in the 1990s, according to a new study. Security software firm Avast found that more than half of all routers are poorly protected by default or common, easily hacked password/ID combinations. Easily hacked password combinations such as admin/admin or admin/password, or even …
John Leyden, 08 Dec 2014
Cartoon of  green skeletal figure reaching out of phone

DeathRing: Cheapo Androids pre-pwned with mobile malware

A new mobile Trojan is being pre-loaded onto smartphones somewhere in the supply chain. DeathRing masquerades as a ringtone app and is impossible to remove because it’s pre-installed in the system directory, according to mobile security firm Lookout. Samples of the malware are restricted to entry-level phones purchased in Asian …
John Leyden, 04 Dec 2014
Pirate Flag

Knockoff knockdown: Euro cops shutter 300 'counterfeit' domains

Nearly 300 domain names flogging illegal merch have been seized by Europol as part of a global crackdown on sites selling counterfeit goods before Christmas. Europol and US Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI), together with 25 law enforcement agencies from 19 countries, seized 292 …
Kat Hall, 02 Dec 2014

Home Depot hacker hosing cost a wallet-draining $43m (so far)

Hacked hardware mart Home Depot has forked out $43m to quash spot fires emanating from the data breach inferno this year, SEC filing documents show. The payout covered damages from the theft of 56 million payment cards and 53 million email addresses. It covered the cost of investigating this year's five-month-long breach, …
Darren Pauli, 27 Nov 2014
iPhone shop Shenzhen

ITU thought bubble ponders mass mobe-tracking to kill fake IT

The International Telecommunications Union (ITU) will next week meet to consider the issue of “counterfeit and substandard ICT products” and what can be done about them, but some of the proposals on the table look more than a little worrying. Notice of the meeting was posted in late September, when the ITU announced next week's …
Simon Sharwood, 13 Nov 2014