Articles about Cracking

Regina Egbert, El Reg's virtual news anchor

The week in tech news with cracking coverage from Regina Eggbert

Youtube Video A short stroll through this week's top tech news, with animated anchor Regina Eggbert. Get more in depth knowledge on the Apple, Google and Microsoft stories here, here and here. ® Regina Egbert, El Reg's virtual news anchor

China ALSO building encryption-cracking quantum computer

It’s not just the NSA that’s said to be working on a quantum computer – China is also pulling out all the stops to beat its arch rival with a crypto-cracking machine of its own. The National Natural Science Foundation of China funded 90 quantum-based projects in 2013, with the order from Beijing to get the job done irrespective …
Phil Muncaster, 10 Jan 2014

Kiwis get cracking with gigabit residential broadband

While Australians wait for a copper network “upgrade” that can't be guaranteed to deliver better than 25 Mbps, a speed war has broken out across the Tasman, with residential gigabit plans arriving at wholesale prices that could see households pay under $NZ100 per month. The wholesaler has announced the offering is now available …
"Image from the glassbrain project, neuroscapelab.com, UCSF

Trio share 2014 Nobel Prize for cracking internal GPS of the brain

The 2014 Nobel Prize in Physiology or Medicine has been awarded to three neurologists for their work in helping to understand how the brain can remember where we are – and finding out which nerve cells are responsible. Half of the prize was awarded to American-born John O'Keefe, who is a naturalized Brit and has spent his career …
Iain Thomson, 07 Oct 2014
padlock

Get cracking on STARTTLS says Facebook

Facebook has debunked the idea that SMTP STARTTLS encryption still isn't taking hold, after an analysis of the billions of messages it sends to millions of servers each day. In this blog post, The Social NetworkTM says the numbers are clear: “STARTTLS has achieved critical mass and there is immediate value in deploying it”, and …
The Register breaking news

Behold, replica Nazi-code-cracking Colossus computer IN LEGO FORM

Pics A Lego fan's miniature representation of the famous codebreaking Colossus Mark 2 has agreeably gone on show at Bletchley Park, where the original machine did vital wartime work breaking Germany's Lorenz ciphers. James Pegrum's homage to Colossus is entertaining visitors as part of the The National Museum of Computing's (TNMOC) …
Lester Haines, 06 Aug 2013
Indonesia's spiffing No Spam logo

Guess which major US telco ISN'T cracking down on premium SMS spam?

AT&T, Sprint, and T-Mobile have agreed to stop charging their customers for premium text messages (PSMS), a practice that costs US folks an estimated $2bn in excess charges a year. The ban isn't total – Verizon isn't stopping the practice because it says it is still in the process of winding down its PSMS service. But it's not a …
Iain Thomson, 23 Nov 2013

Snowden docs: NSA building encryption-cracking quantum computer

The latest document stash from whistle-blower Edward Snowden shows that the NSA has budgeted $79.7m for the development of a quantum computer capable of "owning the net." "The Owning the Net (OTN) Project provides the technological means for NSA/CSS to gain access to and securely return high value target communications," one …
Iain Thomson, 03 Jan 2014
Bletchley Park

Bletchley Park vows to upload secret World War II code-cracking archives

Bletchley Park, the British wartime code-breaking center that housed computing legends such as Alan Turing and Tommy Flowers, will put its paper archives online after HP provided the scanning hardware to get the job done. "We've been wanting to do this for a while. It was first discussed five years ago, but we have just never …
Iain Thomson, 08 Nov 2013

British boffin muzzled after cracking car codes

Here is a tale of two security research presentations, both looking at motor vehicle security in a world in which even the humblest shopping trolley now has more brainpower than a moonshot. Flavio Garcia, a University of Birmingham lecturer familiar with insecurity in car systems – here, for example, is a paper he co-authored …

Cracking copyright law: How a simian selfie stunt could make a monkey out of Wikipedia

Analysis That so-called Macaca nigra monkey selfie isn’t in the public domain, no matter what Wikipedia wants you to think. In fact, the encyclopedia's stance on the matter could backfire and hit it in the pocket. A photo sold by British snapper David Slater since 2011 hit the headlines again this month when Wikipedia refused to …
Andrew Orlowski, 24 Aug 2014
Tardis

Couchbase unhitches NoSQL: Multi-Dimensional Scaling is almost here

Couchbase is cracking open its NoSQL document store’s architecture by allowing core database services to run on different server parts. The firm announced Monday Couchbase Server 4.0, featuring an architecture it's developed called Multi-Dimensional Scaling. Multi-Dimensional Scaling will let you isolate query, index and data …
Gavin Clarke, 23 Mar 2015
airplane

Get paid (airline) peanuts with United's new bug bounty program

United Airlines is starting a bug bounty program aimed at finding flaws and errors in its web portals – but the rewards it's offering aren't payable in money, but in air miles. "At United, we take your safety, security and privacy seriously. We utilize best practices and are confident that our systems are secure," the company …
Iain Thomson, 14 May 2015

Heistmeisters crack cost of safecrackers with $150 widget

A pair of Melbourne security professionals have developed a $150 auto-dialer safe cracker that replicates a machine worth tens of thousands of dollars and sold only to military customers. The unit launches automatic brute force attacks against group two combination locks used in high-security environments like ATMs and gun safes …
Darren Pauli, 13 Oct 2014

El Reg Summer Lectures Span Dark Net, Rare Earths, and Vintage Tech

Reg Events If you’re the sort of Reg reader who likes to expand their mind as well as their tech arsenal, you’ll want to snap up tickets for our Summer series of Lectures. We’ve assembled a cracking trio of speakers, who between them will take you on a tour of sometimes obscure but incredibly interesting corners of the world of tech – all …
Joe Fay, 16 Apr 2015
Archer cracks the ISIS mainframe's password

'Use 1 capital' password prompts make them too predictable – study

A new study has found that password structure is a key flaw in making login IDs hard to guess. Security firm Praetorian analyzed 34 million stolen passwords from the LinkedIn, eHarmony and Rockyou breaches and found that 50 per cent of all passwords followed 13 basic structures. This lack of entropy makes it possible to use …
John Leyden, 27 Apr 2015
The F-35B doors open from the side. Credit: JSF Program

Snowden doc leak 'confirms' China stole F-35 data

China now knows what most people in the west are catching up with: that the F-35 Joint Strike Fighter is a lemon. The latest round of managed information release by Edward Snowden via Spiegel (one of a series) includes the snippet that Chinese security services copied “terabytes” of data about the aircraft. The release states …
Great Wall of China

Microsoft Outlook PENETRATED by Chinese 'man-in-the-middle'

Microsoft suffered a "man-in-the-middle" attack on its Outlook email service in China over the weekend, according to Greatfire.org. The assault on its mail systems apparently lasted around 24 hours before returning to normal. It came after Google's Gmail was blocked in the People's Republic late last year. Greatfire.org said …
Team Register, 19 Jan 2015

Snapchat wants $19 BEEELLION for your selfies

Photo-sharing service Snapchat is reportedly seeking funding that would value the company at US$19bn. A report from Bloomberg cites sources familiar in claiming that the disappearing pic specialist wants to raise $500m in funding based on the hefty $19bn valuation. That round of funding would, to say the least, represent a …
Shaun Nichols, 18 Feb 2015
Brute Force

Password reset sites expose crackable PeopleSoft creds

SAP hackers Alexander Polyakov and Alexey Tyurin say Oracle PeopleSoft contains unpatched vulnerabilities and weaknesses that allow attackers to easily obtain admin passwords. The hackers say the PeopleSofts credential can be yanked from the TokenID contained within password recovery sites and cracked using a cheap graphical …
Darren Pauli, 28 May 2015

Saudi Arabia hires 'ethical hackers' to silence smut slingers

Saudi Arabia's prude police have hired ethical hackers to pop hedonistic Twitter accounts identified for spruiking smut leading to arrests. The crackdown reported by Emirates24 was led by the religious police which hired the hackers to obtain personal details of Twitter users. The Commission for the Promotion of Virtue and …
Darren Pauli, 05 Jan 2015
Combo Breaker

Hacker 3D prints device that can crack a combo lock in 30 seconds

A California hacker who has become an expert in cracking locks has invented a 3D-printed machine that can crack a rotary combination lock in around 30 seconds – and he's released the plans, 3D models, and code as open source. Youtube Video A few weeks ago, Samy Kamkar told the world about a manufacturing flaw in Master Lock …
Iain Thomson, 15 May 2015
NGMN 5G Vision

Carriers want 5G to do everything, for anything, anywhere

MWC2015 The Next Generation Mobile Networks (NGMN) carriers' club has sorted out its ideas of what 5G's future, and set forth a blueprint of its preferred vision of a post-4G world. The 5G world is going to have to get cracking, though: the roadmap, with contributions from luminaries like AT&T, BT, China Mobile, DoCoMo, SingTel, …
The Register breaking news

Cracking software retrieves iPhone 4 passwords

A Russian password-cracking company has released software it says can recover passwords stored on Apple's latest iPhone without modifying the device or any of the data stored on it. ElcomSoft of Moscow says the latest version of its iPhone Password Breaker will recover the encrypted keychains that the iPhone 4 uses to store …
Dan Goodin, 05 Aug 2010

Infosec bods demo GPU keylogger. Don't tell the NS... oh, wait

Security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a computer. Team Jellyfish's Demon keylogger proof-of-concept code operates in a blind spot that conventional security software is simply not designed to inspect. The …
John Leyden, 13 May 2015
The Register breaking news

Web service automates WordPress password cracking

Hackers have developed a distributed Wordpress admin account cracking scheme that poses a severe risk for the security of blogs whose owners select insecure passwords. PHP scripts located on a virtual server run bruteforce (password guessing) attacks on targeted sites. Many sites can be attacked at the same time by the system, …
John Leyden, 30 Nov 2009
Brute force

Leak of '5 MEELLLION Gmail passwords' creates security flap

Plain-text passwords and account names linked to five million Gmail accounts have been leaked onto several Russian forums. Security experts had already confirmed the data seemed legit, albeit approximately three years old, before Google put up its blog post on the subject. The leak, to a variety of forums, not all of which are …
John Leyden, 11 Sep 2014
Riecoin

Cryptocurrency cruncher cranks prime number constellation

Bitcoin mining, our own Simon Rockman wrote last January, “is essentially a brute-force attack on the generating algorithm”. “Bitcoin, and all the other alt-coins, is training a skillset for building password-cracking hardware that is both powerful and portable,” he wrote. It looks like cryptocurrencies are also helping to spot …
Simon Sharwood, 28 Nov 2014

Exercise-tracking app not QUITE fit for purpose

Popular fitness app MyFitnessPal, used by 65 million people, has fixed a vulnerability that exposed personal information including date of birth records. The profiles allowed users to fill out their private location data including country, state, and city but not street-level addresses for the purposes of linking neighbours. …
Darren Pauli, 22 Sep 2014

Reg Lectures serve up Net Terrors, Rare Earths, and Ancient Tech

Reg Events If you want to get ahead of the on-beach reading lists this year, you need to get down to our next series of Register Lectures. We’ve lined up three lecture evenings that will leave you streets ahead of your colleagues. And as always, it’s you, the readers, who will be asking the questions of our top notch speaker lineup. All …
Joe Fay, 24 Apr 2015
The NSA Unchained

That earth-shattering NSA crypto-cracking: Have spooks smashed RC4?

Analysis Fresh revelations from whistleblower Edward Snowden suggest that the NSA can crack TLS/SSL connections, the widespread technology securing HTTPS websites and virtual private networks (VPNs). Although reports from the New York Times and its allied publications held off on the specifics, it may all mean that US spooks can reliably …
John Leyden, 06 Sep 2013
Close-up of a woman's lips, slightly pixelated as if on a CRT TV. http://www.sxc.hu/photo/20984  Pic via SXC - no restrictions

Fake hottie hackers flung info-slurping malware at Syrian opposition – FireEye

Cyberspies used social engineering trickery to steal Syrian opposition’s strategies and battle plans, according to security researchers. Hackers employed a familiar tactic: ensnaring victims through conversations with seemingly sympathetic and attractive women. As the conversations progressed onto Skype chats, the “women” would …
John Leyden, 02 Feb 2015
Privacy image

Google’s privacy policy: Italians probing a little deeper

Google is to be subject to regular on-site spot checks by the Italian data protection regulator under moves to ensure the Chocolate Factory complies with the country's privacy laws. "For the first time in Europe, it will be the subject of regular checks to monitor progress status of the actions to bring its platform into line …
Kat Hall, 23 Feb 2015

Firefox, Chrome, IE, Safari EXPLOITED to OWN Mac, PCs at Pwn2Own 2015

Security vulns in every one of the big four web browsers were exploited at the Pwn2Own hacking contest on Friday to remotely execute arbitrary code on Windows PCs. Firefox, Safari, Chrome and Internet Explorer all fell to the skills of the competition entrants, some in less than a second. All the vulnerabilities exploited will …
Iain Thomson, 21 Mar 2015
eBay

Crackdown on eBay sellers 'failing to display' VAT numbers

Blighty's Trading Standards has reported more than 200 non-EU sellers to eBay for failing to display VAT numbers – a figure thought to "barely scratch the surface" of traders breaching the rules, El Reg can reveal. Under e-commerce regulations, a VAT number must be easily, directly and permanently accessible. As an intermediary …
Kat Hall, 02 Feb 2015
A hammer and bent screw

Ouch! Google crocks capacitors and deviates DRAM to root Linux

Last summer Google gathered a bunch of leet security researchers as its Project Zero team and instructed them to find unusual zero-day flaws. They've had plenty of success on the software front – but on Monday announced a hardware hack that's a real doozy. The technique, dubbed "rowhammer", rapidly writes and rewrites memory to …
Iain Thomson, 10 Mar 2015

Zuckerberg bombshell: Man married to Chinese woman speaks Chinese in China

Facebook CEO Mark Zuckerberg shocked a Chinese audience with his mastery of Mandarin – a language that's as difficult to master as his website's privacy settings. The advertising kingpin was speaking at Tsinghua University in China, where he stunned attendees by ditching English and speaking in Mandarin for more than half an …
Jasper Hamill, 23 Oct 2014

Speaking in Tech: 'Software-defined' anything makes me BARF in my MOUTH

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Ed is out so it's just Sarah and Greg celebrating Canada Day with special guest (and proud Canadian) Chad Sakac, senior veep for Global Presales Technical Resources at EMC. This week we discuss… Greg, Sarah …
Team Register, 02 Jul 2014

REVEALED: TEN MEEELLION pinched passwords and usernames

Security consultant Mark Burnett has dumped 10 million username and passwords onto the world, in what he claims is an effort to improve research. The huge pile, collected from caches revealed after years of breaches, was scrubbed clean of corporate information and domain data before its release. Burnett said he went to " …
Darren Pauli, 11 Feb 2015
Random numbers

GCHQ boffins quantum-busted its OWN crypto primitive

While the application of quantum computers to cracking cryptography is still, for now, a futuristic scenario, crypto researchers are already taking that future seriously. It came as a surprise to Vulture South to find that in October of this year, researchers at GCHQ's information security arm the CESG abandoned work on a …
The Register breaking news

Virtual Nazi-code-cracking Colossus in fundraising appeal

The National Museum of Computing (TNMOC) has turned to a tried-and-tested fundraising method to establish a home for the rebuilt Colossus computer at Bletchley Park. Individuals and firms are invited to buy up pixels of an online picture of the wartime code-breaking machine - at 10 pence per dot with a minimum spend of £10 - …
John Leyden, 10 Feb 2012

Microsoft: So sorry for NOT paying Xbox indie game devs on time

Making computer games can be a hard slog for indie developers. Big studios have piles of R&D and marketing cash, and it's easy to see your pride and joy fall into unplayed obscurity. Microsoft sought to help indie developers with the Xbox Live Indie Games (XBLIG) portal on its Live console marketplace, which was set up six years …
Iain Thomson, 04 Dec 2014

China: Microsoft, don't shy away from our probe

China's antitrust regulator has confirmed it met Microsoft's lawyers over its investigation into the US firm, warning it to abide by Chinese law and not to interfere with the probe. China's State Administration for Industry and Commerce said in a statement (translated by Google) that it had spoken with deputy general counsel …
Stanford concept graphic indicating quantum electron interference holograms

UK.gov shovels £15m into training new quantum engineers

The government is flinging £15m at training "the next generation" of quantum engineers through investment in "skills hubs". Implicitly suggesting the existence of a current generation of quantum engineers, the Department of BIS hopes the investment will support the building of "innovative new products like 6G smartphones." As …

Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!

It's no secret that Silicon Valley is a workplace that favours youth. Not just because the young have new ideas and perspectives, but also because 20-something geeks who work with all their friends have no problem putting in 60 hours a week cracking out code. Now, it seems that some of the biggest names in the business are …
Shaun Nichols, 15 Oct 2014
President Putin on horseback

Google says NYET! to Putin, pulls techies out of Russia – report

Google has refused to deny that it's pulling its engineering team out of Russia, leaving only sales and marketing people behind. The reported shuttering of Google's engineering office comes after restrictive laws were passed by the Russian parliament that will force the web giant, and others like it, to keep all data on Russians …
Iain Thomson, 12 Dec 2014
Hacked sarcasm

Sony Pictures in IT lock-down after alleged hacker hosing

Sony Pictures is investigating a breach that has seen hackers supposedly steal reams of internal data and splash defacements across staff computers. The company is now in lock-down as it wrestles with the problem. The beleaguered company, writes Variety, has requested staff disconnect their computers and personal devices from …
Darren Pauli, 25 Nov 2014
Web browsers

Choc Factory splatters 51 bugs, Mozilla bumps cert checker

Google and Firefox have upgraded their flagship browsers, crushing bugs and cracking down on bad certificates along the way. The Choc Factory's Chrome 41 swats 51 bugs of which at least 13 are classified as high severity and six considered medium risks. Google engineer Penny MacNeil thanked security researchers for the effort …
Darren Pauli, 05 Mar 2015
big droplets falling from rain cloud

VMware cracks US$6bn for the year, says SaaS will slow growth

VMware today used its Q4 2014 earnings call to warn its revenue growth will slow because it's doing so well in the cloud. The overall picture is rosy for VMware, which announced a US$1,703 million quarter and $6.03 billion dollar year, up 15 per cent and 16 per cent respectively on the corresponding periods from 2013. Other …
Simon Sharwood, 28 Jan 2015
The Register breaking news

Trucker prangs rig while cracking one off

Swedish police believe that a German lorry driver who crashed his vehicle near Borås earlier this week may have been off his box on drugs, according to the Borås Tidning newspaper. Suspicions that the unnamed 30-something trucker, who collided with the central reservation and flipped his vehicle, could have ingested illegal …
Lester Haines, 25 Sep 2009