Articles about Cracking

Regina Egbert, El Reg's virtual news anchor

The week in tech news with cracking coverage from Regina Eggbert

Youtube Video A short stroll through this week's top tech news, with animated anchor Regina Eggbert. Get more in depth knowledge on the Apple, Google and Microsoft stories here, here and here. ® Regina Egbert, El Reg's virtual news anchor

Dear diary. Gotta axe 15% of staff, it's like I'm cracking up – Qualcomm

Mobile chipmaker Qualcomm says it's putting its business under the microscope with an eye to restructuring after posting lackluster third-quarter results, including revenue that missed estimates. "We are making fundamental changes to position Qualcomm for improved execution, financial and operating performance," Qualcomm CEO …
Neil McAllister, 22 Jul 2015

China ALSO building encryption-cracking quantum computer

It’s not just the NSA that’s said to be working on a quantum computer – China is also pulling out all the stops to beat its arch rival with a crypto-cracking machine of its own. The National Natural Science Foundation of China funded 90 quantum-based projects in 2013, with the order from Beijing to get the job done irrespective …
Phil Muncaster, 10 Jan 2014

Kiwis get cracking with gigabit residential broadband

While Australians wait for a copper network “upgrade” that can't be guaranteed to deliver better than 25 Mbps, a speed war has broken out across the Tasman, with residential gigabit plans arriving at wholesale prices that could see households pay under $NZ100 per month. The wholesaler has announced the offering is now available …
"Image from the glassbrain project, neuroscapelab.com, UCSF

Trio share 2014 Nobel Prize for cracking internal GPS of the brain

The 2014 Nobel Prize in Physiology or Medicine has been awarded to three neurologists for their work in helping to understand how the brain can remember where we are – and finding out which nerve cells are responsible. Half of the prize was awarded to American-born John O'Keefe, who is a naturalized Brit and has spent his career …
Iain Thomson, 07 Oct 2014
padlock

Get cracking on STARTTLS says Facebook

Facebook has debunked the idea that SMTP STARTTLS encryption still isn't taking hold, after an analysis of the billions of messages it sends to millions of servers each day. In this blog post, The Social NetworkTM says the numbers are clear: “STARTTLS has achieved critical mass and there is immediate value in deploying it”, and …
The Register breaking news

Behold, replica Nazi-code-cracking Colossus computer IN LEGO FORM

Pics A Lego fan's miniature representation of the famous codebreaking Colossus Mark 2 has agreeably gone on show at Bletchley Park, where the original machine did vital wartime work breaking Germany's Lorenz ciphers. James Pegrum's homage to Colossus is entertaining visitors as part of the The National Museum of Computing's (TNMOC) …
Lester Haines, 06 Aug 2013
Indonesia's spiffing No Spam logo

Guess which major US telco ISN'T cracking down on premium SMS spam?

AT&T, Sprint, and T-Mobile have agreed to stop charging their customers for premium text messages (PSMS), a practice that costs US folks an estimated $2bn in excess charges a year. The ban isn't total – Verizon isn't stopping the practice because it says it is still in the process of winding down its PSMS service. But it's not a …
Iain Thomson, 23 Nov 2013

Snowden docs: NSA building encryption-cracking quantum computer

The latest document stash from whistle-blower Edward Snowden shows that the NSA has budgeted $79.7m for the development of a quantum computer capable of "owning the net." "The Owning the Net (OTN) Project provides the technological means for NSA/CSS to gain access to and securely return high value target communications," one …
Iain Thomson, 03 Jan 2014
Bletchley Park

Bletchley Park vows to upload secret World War II code-cracking archives

Bletchley Park, the British wartime code-breaking center that housed computing legends such as Alan Turing and Tommy Flowers, will put its paper archives online after HP provided the scanning hardware to get the job done. "We've been wanting to do this for a while. It was first discussed five years ago, but we have just never …
Iain Thomson, 08 Nov 2013

British boffin muzzled after cracking car codes

Here is a tale of two security research presentations, both looking at motor vehicle security in a world in which even the humblest shopping trolley now has more brainpower than a moonshot. Flavio Garcia, a University of Birmingham lecturer familiar with insecurity in car systems – here, for example, is a paper he co-authored …

Spaniard claims WWII WAR HERO pigeon code crack. Explain please

A 22-year old Spaniard claims that he's cracked a previously unsolved WWII coded message. Others have claimed this before and there's nothing particularly solid to back up the latest effort, but let's have a look at it anyway. Dídac Sánchez claims that he had cracked the encryption scheme used in the last undeciphered message …
John Leyden, 28 Aug 2015

Cracking copyright law: How a simian selfie stunt could make a monkey out of Wikipedia

Analysis That so-called Macaca nigra monkey selfie isn’t in the public domain, no matter what Wikipedia wants you to think. In fact, the encyclopedia's stance on the matter could backfire and hit it in the pocket. A photo sold by British snapper David Slater since 2011 hit the headlines again this month when Wikipedia refused to …
Andrew Orlowski, 24 Aug 2014

Indiana Jones whips Bond in greatest movie character poll

Reg reader movie buffs will doubtless have an opinion on the news that Indiana Jones has been voted "greatest movie character of all time". The whip-cracking archaeologist beat James Bond into second spot in a public poll conducted by Empire. Han Solo rolled in third, meaning two podium appearences for George Lucas and Harrison …
Lester Haines, 24 Jun 2015

OpenSSL releases seven patches for seven vulns

Users are being urged to upgrade OpenSSL to prevent eavesdroppers listening to otherwise encrypted connections undermined through the LogJam vulnerability thought to be the NSA's crypto-cracking tool of choice. OpenSSL maintainers have patched seven vulnerabilities including the LogJam vulnerability (CVE-2015-4000) which allows …
Darren Pauli, 12 Jun 2015
Tardis

Couchbase unhitches NoSQL: Multi-Dimensional Scaling is almost here

Couchbase is cracking open its NoSQL document store’s architecture by allowing core database services to run on different server parts. The firm announced Monday Couchbase Server 4.0, featuring an architecture it's developed called Multi-Dimensional Scaling. Multi-Dimensional Scaling will let you isolate query, index and data …
Gavin Clarke, 23 Mar 2015
Tim Worstall victory dance at his Reg lecture

Tim Worstall dances to victory over resources scaremongerers

Reg lecture Tim Worstall brought together rare minerals, bacon and eggs, and his own interpretive victory dance in his battle to stop us all worrying about running out of resources, at our most recent Reg lecture. In just under 50 minutes, Tim covered the economics of resources, why you won’t find a Ferrari in a scrap yard, and just what …
Joe Fay, 22 Jun 2015
airplane

Get paid (airline) peanuts with United's new bug bounty program

United Airlines is starting a bug bounty program aimed at finding flaws and errors in its web portals – but the rewards it's offering aren't payable in money, but in air miles. "At United, we take your safety, security and privacy seriously. We utilize best practices and are confident that our systems are secure," the company …
Iain Thomson, 14 May 2015

Heistmeisters crack cost of safecrackers with $150 widget

A pair of Melbourne security professionals have developed a $150 auto-dialer safe cracker that replicates a machine worth tens of thousands of dollars and sold only to military customers. The unit launches automatic brute force attacks against group two combination locks used in high-security environments like ATMs and gun safes …
Darren Pauli, 13 Oct 2014
Jamie Bartlett delivering Register Summer Lecture

Camgirls, crypto currency and beer: The Register tours the Dark Net

Register Lectures Very few of us, even at The Reg, have spent a year trawling the darkest corners of the internet, getting to know right wing agitators, crypto currency zealots, and Yorkshire’s leading Camgirl. Jamie Bartlett did though, and he shared his experiences with a room full of Register readers at our Summer lecture on May 21. He took …
Joe Fay, 05 Jun 2015

El Reg Summer Lectures Span Dark Net, Rare Earths, and Vintage Tech

Reg Events If you’re the sort of Reg reader who likes to expand their mind as well as their tech arsenal, you’ll want to snap up tickets for our Summer series of Lectures. We’ve assembled a cracking trio of speakers, who between them will take you on a tour of sometimes obscure but incredibly interesting corners of the world of tech – all …
Joe Fay, 16 Apr 2015
Facebook M digital assistant logo

New low for humanity: ONE BEELLION lost souls log on to Facebook in one day

Humanity reached a new low point last Monday, 24 August: on that day a billion of your fellow homo sapiens logged on to Facebook, which subsequently decided humans can't be trusted to do their own shopping. Mark Zuckerberg, founder of the free content ad network announced the landmark on Facebook, of course. Zuck wrote: “This …
Simon Sharwood, 28 Aug 2015
Snake oil salesman

Failing to zap bogus reviews about your biz is illegal, snarls regulator

The UK's Competition and Markets Authority is cracking down on companies publishing fake reviews or taking cash for unmarked promotional content. The CMA said it has opened an investigation using its "consumer enforcement powers" into a number of companies over non-disclosure of paid endorsements. The regulator said it is also …
Kat Hall, 22 Jun 2015
Sim card

Researchers look sideways to crack SIM card AES-128 encryption

Black Hat 2015 In February, whistleblower Edward Snowden revealed that the NSA and GCHQ hacked one of the world’s biggest SIM card manufacturers to clone cards and crack encryption, but research revealed at Black Hat shows they needn’t have bothered. Yu Yu (yes, that is my real name, he joked) is a research professor with Shanghai Jiao Tong …
Iain Thomson, 06 Aug 2015
Banned

I block, you block, we all block Twitter shock schlock

Twitter has introduced a feature that allows users to share their block lists with others to help single out abusive users. Beginning on Wednesday, the 140-character gab service has enabled Twitter users to share data on who they have blocked from following their own feeds, with the idea that others will use the information to …
Shaun Nichols, 11 Jun 2015
Archer cracks the ISIS mainframe's password

'Use 1 capital' password prompts make them too predictable – study

A new study has found that password structure is a key flaw in making login IDs hard to guess. Security firm Praetorian analyzed 34 million stolen passwords from the LinkedIn, eHarmony and Rockyou breaches and found that 50 per cent of all passwords followed 13 basic structures. This lack of entropy makes it possible to use …
John Leyden, 27 Apr 2015

Feds count Cryptowall cost: $18 million says FBI

Cryptowall authors have wrought some US$18 million in damages on US users and businesses alone, according to the FBI. The Cryptolocker-imitation ransomware family has etched itself as one of the most prolific and capable since it was first detected in April 2014. Global damage reported to the US agency are likely considerably …
Darren Pauli, 24 Jun 2015
4 arrows signs in arrow on wooden wall

Tired tablets don't tickle the imagination, so sales fall again

Box-counter IDC's latest Quarterly tablet tracker has more bad news for fondleslab fans: sales are down and the market is fragmenting. The firm's preliminary data for 2015's second quarter finds 44.7 million fondleslabs and typoslabs shipped, down seven per cent on 2014's shipments. Q2's never a cracker – it contains no major …
Simon Sharwood, 30 Jul 2015
The F-35B doors open from the side. Credit: JSF Program

Snowden doc leak 'confirms' China stole F-35 data

China now knows what most people in the west are catching up with: that the F-35 Joint Strike Fighter is a lemon. The latest round of managed information release by Edward Snowden via Spiegel (one of a series) includes the snippet that Chinese security services copied “terabytes” of data about the aircraft. The release states …
Sleeper

Oi, Europe: join in the sharing economy fun, yells Gov.uk

Blighty is demanding Europe make it easier for sharing economy companies by cracking down on those spoilsport member states who "unlawfully" get in their way, Gov.uk said today in a "non-paper" on the subject. "We need a measured approach: putting a hold on reactive bans which don’t recognise the reality of internet-enabled …
Kat Hall, 20 Jul 2015
£10 notes. Pic: Howard Lake

Show us your security chops with the Cyber 10K challenge

Competition NCC Group has devised a lovely cyber security competition, Cyber 10K, which sees the winning contestant receive £10,000 and expert advice from the company to develop their own security solution.Enter and find out more here. We like the Cyber 10K concept so much that El Reg’s very own John Leyden, who has covered the IT …
David Gordon, 20 Aug 2015
supernova

Exploding 'laptop batt' IN SPAAACE! Speeding lithium spaffed by nova

Pic For the first time, astronomers have detected lithium spread across space at high speed by an exploding star. The eggheads hope this discovery will solve one of the chemical riddles of the universe. Using telescopes in Chile, an Italian team focused on Nova Centauri 2013, a nova whose light reached Earth two years ago. It is …
Iain Thomson, 29 Jul 2015
Great Wall of China

Microsoft Outlook PENETRATED by Chinese 'man-in-the-middle'

Microsoft suffered a "man-in-the-middle" attack on its Outlook email service in China over the weekend, according to Greatfire.org. The assault on its mail systems apparently lasted around 24 hours before returning to normal. It came after Google's Gmail was blocked in the People's Republic late last year. Greatfire.org said …
Team Register, 19 Jan 2015

Snapchat wants $19 BEEELLION for your selfies

Photo-sharing service Snapchat is reportedly seeking funding that would value the company at US$19bn. A report from Bloomberg cites sources familiar in claiming that the disappearing pic specialist wants to raise $500m in funding based on the hefty $19bn valuation. That round of funding would, to say the least, represent a …
Shaun Nichols, 18 Feb 2015
Uber launch party by https://www.flickr.com/photos/5chw4r7z/ CC2.0 sharelalike attribution https://creativecommons.org/licenses/by-sa/2.0/

Uber execs charged, will stand trial in France

French prosecutors have charged two key Uber executives with deceitful commercial practices, operating an illegal taxi service, and illicit storage of personal data. The pair were collared as they visited Paris cops to discuss the ongoing protests in the city over the taxi-booking app. The charges relate to the Uberpop service, …
Iain Thomson, 30 Jun 2015

Microsoft nixes A-V updates for XP, exposes 180 MEEELLION luddites

Windows XP holdouts are even more danger than ever after Microsoft abandoned anti-malware support for the ancient platform. Redmond overnight stopped providing XP support for new and existing installs of its Security Essentials package. The run-as-needed Malicious Software Removal Tool has also been axed, while support for …
Darren Pauli, 15 Jul 2015
The Register breaking news

Web service automates WordPress password cracking

Hackers have developed a distributed Wordpress admin account cracking scheme that poses a severe risk for the security of blogs whose owners select insecure passwords. PHP scripts located on a virtual server run bruteforce (password guessing) attacks on targeted sites. Many sites can be attacked at the same time by the system, …
John Leyden, 30 Nov 2009
The Register breaking news

Cracking software retrieves iPhone 4 passwords

A Russian password-cracking company has released software it says can recover passwords stored on Apple's latest iPhone without modifying the device or any of the data stored on it. ElcomSoft of Moscow says the latest version of its iPhone Password Breaker will recover the encrypted keychains that the iPhone 4 uses to store …
Dan Goodin, 05 Aug 2010

Saudi Arabia hires 'ethical hackers' to silence smut slingers

Saudi Arabia's prude police have hired ethical hackers to pop hedonistic Twitter accounts identified for spruiking smut leading to arrests. The crackdown reported by Emirates24 was led by the religious police which hired the hackers to obtain personal details of Twitter users. The Commission for the Promotion of Virtue and …
Darren Pauli, 05 Jan 2015
Brute Force

Password reset sites expose crackable PeopleSoft creds

SAP hackers Alexander Polyakov and Alexey Tyurin say Oracle PeopleSoft contains unpatched vulnerabilities and weaknesses that allow attackers to easily obtain admin passwords. The hackers say the PeopleSofts credential can be yanked from the TokenID contained within password recovery sites and cracked using a cheap graphical …
Darren Pauli, 28 May 2015
Laurel and Hardy on the phone

Phone hacking blitz hammers UK.biz's poor VoIP handsets

UK businesses are getting disproportionately targeted by a surge of attacks against Voice over IP (VoIP) systems. The growing use of VoIP technology in business and a greater availability of hacking tools that dumb down the process of hacking into systems has led to an increase in attacks worldwide. UK-based systems are being …
John Leyden, 16 Jun 2015
£10 notes. Pic: Howard Lake

Attenda for sale this year? Not on your nelly, says CEO

App hosting and co-lo slinger Attenda was expected to be put up for sale by owner Darwin Private Equity later this year, but postponed the process, and it’s latest financials perhaps explain why. The venture capitalist backed an MBO of Staines-based Attenda in 2011 for £50m and multiple sources told us in May that it had eyed up …
Paul Kunert, 19 Jun 2015
Combo Breaker

Hacker 3D prints device that can crack a combo lock in 30 seconds

A California hacker who has become an expert in cracking locks has invented a 3D-printed machine that can crack a rotary combination lock in around 30 seconds – and he's released the plans, 3D models, and code as open source. Youtube Video A few weeks ago, Samy Kamkar told the world about a manufacturing flaw in Master Lock …
Iain Thomson, 15 May 2015
Great Wall of China

China cracks down further on VPNs as censorship intensifies

China's government is cracking down further on the use of virtual private networks to circumnavigate its Great Firewall, as part of the ongoing game of whack-a-mole between censors and an increasingly tech-savvy population. Charlie Smith, co-founder of the censorship in China monitoring site GreatFire.org, said there has been a …
Kat Hall, 03 Jun 2015
NGMN 5G Vision

Carriers want 5G to do everything, for anything, anywhere

MWC2015 The Next Generation Mobile Networks (NGMN) carriers' club has sorted out its ideas of what 5G's future, and set forth a blueprint of its preferred vision of a post-4G world. The 5G world is going to have to get cracking, though: the roadmap, with contributions from luminaries like AT&T, BT, China Mobile, DoCoMo, SingTel, …
Brute force

Leak of '5 MEELLLION Gmail passwords' creates security flap

Plain-text passwords and account names linked to five million Gmail accounts have been leaked onto several Russian forums. Security experts had already confirmed the data seemed legit, albeit approximately three years old, before Google put up its blog post on the subject. The leak, to a variety of forums, not all of which are …
John Leyden, 11 Sep 2014

Infosec bods demo GPU keylogger. Don't tell the NS... oh, wait

Security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a computer. Team Jellyfish's Demon keylogger proof-of-concept code operates in a blind spot that conventional security software is simply not designed to inspect. The …
John Leyden, 13 May 2015
Pinocchio CC 2.0 Flickr https://www.flickr.com/photos/jepoirrier/

Trebles all round: The BBC's won this licence fee showdown

It's been a great week for the BBC. The Corporation has expanded the Telly Tax onto computers and, on top of that, gained a guarantee of annual inflation-rate increases in the television licence fee. These cancel out the new requirement that the BBC funds free TV for the over-75s, which it must do in full from 2020. As a bonus …
Andrew Orlowski, 10 Jul 2015
The NSA Unchained

That earth-shattering NSA crypto-cracking: Have spooks smashed RC4?

Analysis Fresh revelations from whistleblower Edward Snowden suggest that the NSA can crack TLS/SSL connections, the widespread technology securing HTTPS websites and virtual private networks (VPNs). Although reports from the New York Times and its allied publications held off on the specifics, it may all mean that US spooks can reliably …
John Leyden, 06 Sep 2013

Exercise-tracking app not QUITE fit for purpose

Popular fitness app MyFitnessPal, used by 65 million people, has fixed a vulnerability that exposed personal information including date of birth records. The profiles allowed users to fill out their private location data including country, state, and city but not street-level addresses for the purposes of linking neighbours. …
Darren Pauli, 22 Sep 2014