Feeds

Articles about Endpoint

Amazon spits out offline DynamoDB tester

Amazon has released a tool to let developers test apps that use the DynamoDB API, and to do so offline. The DynamoDB Local test tool was announced by Amazon on Thursday, and gives devs access to a client-side database that supports the complete DynamoDB API, but doesn't manipulate any tables or data in DynamoDB itself." The …
Jack Clark, 13 Sep 2013

Symantec: We've lopped off half our heads, but look how well we're doing now

Storage and security software behemoth Symantec reported increased revenues but profits down in its first fiscal 2014 quarter, as CEO Steve Bennett's companywide reorg made some progress. Symantec's new strategy of focusing the sales firehose on service providers looks like it's beginning to pay off. First quarter fiscal 2014 …
Chris Mellor, 31 Jul 2013
The Register breaking news

Antivirus update broke our interwebs, howl Win XP users

Thousands of Windows XP users were blocked from accessing the internet this week after they applied a misfiring antivirus update from Kaspersky Lab. The issue affected both consumer and business versions of Windows XP. Vista or Windows 7 users were untouched by the snafu. Even so, Kaspersky's support forums quickly filled up …
John Leyden, 06 Feb 2013
CloudONTAP

Snooping on a NetApp event: New cloudy OS on its way

Social media can deliver multiple micro-glimpses of previously closed events, like a NetApp analysts event in San Francisco yesterday which revealed a new OS - Cloud ONTAP - and a coming Connect product for mobile access. Here’s what we discovered by mining a blizzard of tweets from attendees with the hashtag; #NetAppIAS14. It’s …
Chris Mellor, 06 Jun 2014
The Register breaking news

A backdoor into Skype for the Feds? You're joking...

Heavyweights of the cryptographic world have lined up behind a campaign against proposed US wiretapping laws that could require IT vendors to place new backdoors in digital communications services. Technical details are vague at present, but the planned law could mandate putting wiretap capabilities in endpoints to cover …
John Leyden, 21 May 2013

NASA's nuclear Mars tank REBELS against human control

NASA's famous nuclear-powered, raygun-armed Mars rover Curiosity has broken free of human control and made up its own mind where to drive across the rusty plains of our neighbour world, according to boffins at the space agency who were formerly in charge of it. Mars rover Curiosity route. Credit: NASA/JPL-Caltech No, I WILL NOT …
Lewis Page, 29 Aug 2013
Cat 5 cable

Citrix soothes frustrated Mac fanbois with Windows VDI tech

Citrix has started the new year with a product to help admins manage Windows desktops on errant Macs, tightening competition between the virtualization company and Parallels and VMware. The "DesktopPlayer" product was announced by Citrix on Thursday and sees the company allow admins to deliver policy-laden Windows images to …
Jack Clark, 09 Jan 2014
Symantec

Symantec Endpoint Security throws out error bugs

Symantec is working on a patch for a bug that generates errors in corporate security protection updates. Workarounds designed to quell the message storm are available but a more comprehensive fix is still in testing. The glitch in the Symantec's LiveUpdate package has left sysadmins managing Symantec Endpoint Protection coping …
John Leyden, 20 Feb 2008
The Register breaking news

Today's antivirus apps ARE 'worse at slaying hidden threats'

The effectiveness of antivirus products has declined, according to tests by German testing outfit AV-Test.org. AV-Test put 25 antivirus products for home users and eight corporate endpoint protection software applications through their paces in November and December 2012. Only an average of 92 per cent of the zero-day attacks …
John Leyden, 15 Jan 2013

MS brandishes 'Katana' HTTP/2.0 server

Microsoft has gone public with a prototype HTTP/2.0 server. The server is designed to implement the version 4 HTTP/2.0 implementable draft published by the IETF earlier in July. The idea, according to IETF HTTPBIS chair Mark Nottingham, is that progressive implementations of HTTP/2.0 will feed back into the standard. “We're …

I've just seen 10% of the PC biz disappear into the cloud

The days of the desktop computer look to be numbered. According to IDC, worldwide shipments of desktop systems fell 10 per cent in 2013, the biggest decline in the platform's history. IDC also predicts that for the first time tablets will outsell laptops and in fact the entire PC market by 2015. To borrow IDC’s terminology, …
Philippe Fossé, 24 Jan 2014
Beached whale

Beached whale Symantec watches revenues recede 7%

Symantec’s latest results show that you can wring more profit out of declining revenues by slashing costs but its not enough to bring you back to growth. Revenues in its fourth fiscal quarter of 2014 ended 28 March were $1.63bn, seven per cent down year-on-year, but net profit jumped 14 per cent to $217m. The full year numbers …
Chris Mellor, 09 May 2014

Symantec update killed biz PCs in three-way software prang

Symantec has apologised after an update to its security software sparked repeated crashes on enterprise Windows XP machines. The antivirus giant withdrew the misfiring definition update, issued on 11 July, hours after problems first appeared, releasing a revised update the next day. No new issues have been reported since this …
John Leyden, 16 Jul 2012

A Tapestry of network complexity

Forget drawing network maps or sending your network management software on an epic tour of auto-discovery: a group getting ready to launch an open-source “network complexity scoring” tool says it's all about the endpoint. Infoblox, part of the Flowforwarding.org SDN (software defined networking) community, is prepping the ground …
IBM logo

Big Blue beats path to Australia's north-west

Big Blue, which over the last year has been talent scouting a number of Australian regions via its Smarter Cities program, is to build a data centre in the remote Western Australian town of Geraldton. Geraldton has found itself becoming something of a surprise high-tech hub over recent years, partly courtesy of its proximity to …

Symantec: Don't blame us for New York Times hack

Symantec has taken the unusual step of commenting on a story about a customer, issuing a robust statement denying its anti-virus products were to blame for sophisticated targeted attack on the New York Times. The Gray Lady revealed yesterday that it had been persistently attacked for four months by China-based cyber insurgents. …
Phil Muncaster, 01 Feb 2013
The Register breaking news

AWS peers into soul of Load Balancers for DNS failover

Amazon Web Services now lets users apply automated DNS failover policies to data fronted by load balancers rather than just IPs. As El Reg predicted, Amazon has now added Elastic Load Balancer (ELB) failover to Route 53 just three months after launching a new auto-redirect feature. This means Amazon's "dead man switch" failover …
Jack Clark, 31 May 2013

Java updates too much of a bother? Maybe online banking's just not for you

Security researchers have spotted a surge in attacks against online banking customers, thanks to a new strain of Java-exploiting Trojan Caphaw (aka Shylock). Over the last month or so the malware has targeted customers in at least 24 financial institutions, including Bank of Scotland, Barclays Bank, First Direct, Santander …
John Leyden, 23 Sep 2013

Dodgy Kaspersky update borks THOUSANDS of NHS computers

A misfiring antivirus update from Kaspersky Lab "effectively levelled several networks" last months including systems at Britain's NHS, The Register has learned. A Kaspersky update released on 25 October falsely classified a Windows system file, specifically tcpip.sys, as malign and quarantined it. The procedure left Windows PCs …
John Leyden, 07 Nov 2013

BlackBerry BES: Hey, biz bod, fancy an upgrade on that RIM job... for FREE?

BlackBerry’s Annus horribilis, which has seen the company bombed out of the consumer market has an upside for enterprise users. So keen is the company formerly known as RIM to get its installed BES 5 base onto its new, BYOD-friendly BES 10, it has waived the upgrade fees. Customers who already have a BlackBerry support contract …
Andrew Orlowski, 12 Dec 2013
channel

Symantec reaches endpoint with $830m Altiris

Symantec announced today it would cough up $830m for infrastructure management software firm Altiris. Altiris's software is designed to keep tabs on corporate IT assets such as laptops, PDAs, desktops, and servers. The Utah-based firm was founded in 1998 by Jan Newman and went public in May 2002. Symantec's offer breaks down …

Microsoft haters: You gotta lop off a lot of legs to slay Ballmer's monster

Contrary to increasingly popular belief, Microsoft is not a “dead” company, nor at immediate risk of collapse. I do, however, believe that Microsoft’s “Windows on the endpoint” monopoly days have passed, that Microsoft’s senior management are aware of this and are actively taking steps to compensate. Similarly, I believe that …
Trevor Pott, 29 Jul 2013
channel_partners_deal_handshake

Sysadmins: Let's perch on Microsoft Santa's lap, show him our wish list

Griping is easy. Solving problems in an acceptable way is not. I've had a year to chew on what exactly it is about Microsoft's recent moves that bugs me, so it's time to put my money where my mouth is and try to be constructive. Here is my wish list for the next iteration of Windows, offered in the vain hope that someone at …
Trevor Pott, 19 Mar 2013

Finally, a use for Microsoft Azure: Storing Seagate biz backups

Seagate's online backup service EVault will use the Microsoft Azure cloud as its back-end data vault. According to the Redmond software giant, Azure is good for storing bytes as well as crunching computational tasks. Seagate's EVault Endpoint Protection (EVault EP) product promises cloud-connected backups and data security for …
Chris Mellor, 05 Nov 2012
Cisco Cius: the businessman's iPad

Cisco Cius sees us no more

Cisco Cius: the businessman's iPad Cius tablet Cisco is pulling back from its Cius tablet computer and all but abandoning it. OJ Winge, the SVP of TelePresence Technology at Cisco, has blogged that the Android-powered Cius is heading towards the exit because employees of its business customers are bringing their own, consumer …
Chris Mellor, 26 May 2012

Vulns, exploits, hacks: Trusteer touts tech to terminate troubles

Trusteer is expanding from its speciality of providing transaction protection security to financial institutions with an enterprise-level product designed to guard against zero-day exploits and social engineering. Unpatched application vulnerabilities in widely deployed endpoint applications (such as web browsers) can be given …
John Leyden, 24 Apr 2013
padlock

Didn't have time to ask about it in our security Regcast? No problem

Our Regcast Security: Knowing what you don't know - and what you can do about it (on demand version here) brought together Raimund Genes, CTO of Trend Micro, and Freeform Dynamics' Tony Lock, chief security nagging officer of the analyst community. They gave us a fascinating insight into how the security landscape has changed …
Tim Phillips, 11 Apr 2014

Evidence-based Tweets will SAVE the WORLD - and your waistline

As every entrepreneur reaches mid-life, it’s natural that one’s thoughts begin to turn to one’s one’s “legacy”. Here, the Bongster has an impressive list of achievements to inspire future generations. I have made losing huge amounts of money not just respectable, but mandatory. I have redefined work as leisure. I have brought …
Steve Bong, 02 May 2014
The Register breaking news

Patch often: Cyber-crim toolkits love stinky old gaping holes

More than two in three exploits kits that attempt to inject malware into web surfers' computers were developed in Russia - and at least one in two exploit rather old vulnerabilities. Blackhole 2.0 is the most often used hacking toolkit - installed on websites to attack and take over visitors' computers - but it targets fewer …
John Leyden, 28 Jan 2013
Metfone's floating phone shop

VMware plans courseware on smartmobes for Asian sysadmins

VMware is working on courseware designed to download to and run on mobile phones, as a way of ensuring sysadmins in developing nations can get their hands on the knowledge they need to build virtualised data centres without having to acquire a ruinously expensive PC or leave the bandwidth-poor communities in which they live. …
Simon Sharwood, 04 Sep 2013

Devs angrily dismiss Absolute Computrace rootkit accusation

Developers have denied accusations that their Computrace anti-theft software poses a remote wipe risk for the computers the program is designed to protect. However security researchers at Kaspersky Lab are standing by their warning that Absolute Software's Computrace anti-theft technology poses a hidden threat that might be …
John Leyden, 17 Feb 2014

Digital GIANTS in BLOODY battle to put your EYEBALLS in a JAR

As consumers become ever-more attached to their gadgets - variously glued to PCs and tablets, and, after-hours, laptops, game consoles and mobiles – the gigantic digital businesses are competing with each other to capture and monopolise users' screen time on internet-connected devices. And all of the contenders are using many …
Chris Mellor, 04 Dec 2013
The Register breaking news

Google App Engine update eases cloudy mobile app development

Google has updated its platform-as-a-service to ease mobile app development in the cloud. The "Cloud Endpoints" feature was pushed out in its preview form by Google on Thursday, along with support for the Java 7 runtime on its App Engine platform-as-a-service. "Cloud Endpoints gets rid of all the plumbing code associated with …
Jack Clark, 22 Feb 2013

Belkin buys Linksys from Cisco

Cisco has found a buyer for its unwanted and unstrategic Linksys low-end networking brand, in the form of accessories and small networks player Belkin. Both companies have issued gushing notifications of the deal, but haven't let it be known how much cash or other fungible instruments will change hands to make it happen. It's …
Simon Sharwood, 25 Jan 2013
Source: Simply Smile Photography by Georgia Stephenson

No, it's not a boy band, it's a biz backup suite: A dig into Druva inSync

Druva seems to be on a quest right now to get its name seen by as many people as possible; lately I have been bombarded by more inSync banner ads than I can shake a stick at. So it came as no surprise when the Reg asked me to have a look at what the backup and management biz does – and whether it is any good at it. The inSync …
Dave Cartwright, 30 Apr 2014

These mobile devices just aren't going away. What'll we do, Trevor?

Mobile Device Management (MDM) has become an important sector of the IT industry, but is also something of a moving target. Companies from the level of my own three man shop to the largest enterprises are weighing their options for securing mobile devices. For many, Microsoft's System Center 2012 is the barometer by which all …
Trevor Pott, 14 Mar 2013
estonia attack

Daddy, what will you do in the new security wars?

A senior figure at the anti-virus giant McAfee once told this writer the security industry was a mess. There were too many vendors trying to do too many things. But what the industry mirrors is the threat landscape it is trying to calm down. Just look at what’s happened in the past six months. Two of the most significant …
Tom Brewster, 24 Jun 2014

Watch your brain LIVE in 3D, then train your mind from inside it

As we age, our brains' cognitive abilities decrease. No surprise there. But one team of researches has experimental proof of a therapeutic technique that can reverse that decline: video games. What's more, they've devised a way to directly stimulate your brain to improve its cognitive abilities, and created a 3D digital model, …
Rik Myslewski, 29 Mar 2014
An aerial view of a building in the shape of our vulture logo

The Register Guide to Windows Server 2012: A short extract

Two weeks ago, we published the The Register Guide to Windows Server 2012 as a free ebook. (You can get it here via our ebooks page.) To date there has been about 6,000 downloads, which is cool. To give you a flavour of the book, co-written by Trevor Pott and Liam Proven, we are republishing two extracts - but to read it all you …
David Gordon, 25 Feb 2013
The Register breaking news

Paid secur-o-ware is generally better than free, but not always by a lot

Antivirus tests that assess the effectiveness of security products from the moment users visit infected websites have exposed widely differing performances among the various anti-malware products. The unsponsored tests by Dennis Technology Labs, which were run over a three-month period, revealed that the efficacy of paid-for …
John Leyden, 15 Oct 2012

Firms 'coughed $39 BEEELLION' for system software in 2012

The system infrastructure software racket is a steady business and a profit center for the IT industry, and according to projections from IDC, this space is on track to grow steadily over the next few years. IDC just finished taking a snapshot of this hairball segment of the IT racket, examining the sales of 220 vendors across …
Elgato Thunderbolt Drive+

Vulture wraps claws around Elgato Thunderbolt Drive+ portable SSD

It took a bit of persuading to be convinced that Elgato’s Thunderbolt Drive+ drive should end up on the test bench for review. The company had released the, er, "non-plussed" version a couple of years ago and it didn’t quite set the world on fire. Elgato Thunderbolt Drive+ Elgato Thunderbolt Drive+ now has the addition of USB 3 …
Bob Dormon, 06 Mar 2014

Symantec releases software as Amazon Machine Image

Symantec has made its new O3 cloud identity and access control suite available as an Amazon Machine Image (AMIs), the company's first foray into selling software as a hosted virtual machine. AMIs are virtual machines that are listed in the Amazon Web Services (AWS) marketplace and can be deployed to AWS' EC2 cloud computing …
Simon Sharwood, 17 May 2012
The Register breaking news

'Spend police USB stick data loss mega-fine on IT lessons for cops'

A six-figure fine levelled against police for losing a USB stick of drug probe suspects' details should be spent on training cops to take better care of sensitive data. That's the view of a candidate standing in today's police commissioner election in Greater Manchester. Last month the county's police force was fined £120,000 …
John Leyden, 15 Nov 2012
The Register breaking news

Rotten hackers feast on mouldy Java flaws

Most enterprise networks are riddled with vulnerable Java installations, according to a new study whose release coincides with the discovery of another 0-day Java flaw. Less than one per cent of organisations are running the latest version of Java, according to a study by security software firm Bit9. The most frequently …
John Leyden, 22 Jul 2013

Earth's anemic IT budgets to bounce back in 2013 - Gartner

Now that the US Congress has avoided going over the fiscal cliff, at least for now, the prognosticators at Gartner are ready to talk about IT spending last year and make some projections for the next two years. Worldwide IT spending increases were pretty anemic as IT and telecom services spending were seriously curtailed last …
The Register breaking news

Kaspersky DLP spin-off buys German security firm

Russian data loss prevention firm InfoWatch has bought German software firm cynapspro. InfoWatch, a spin-off of Kaspersky Lab, said the deal will help to sell its technology to more customers in western Europe, particularly small and medium-sized businesses. cynapspro offers a range of enterprise security products including …
John Leyden, 12 Dec 2011
Pano Logic's Pano Device "zero client" - front

I can't wait for Pano to thrust some hard 3D love into size-zero models

Around this time last year I reviewed Pano Logic's Zero Client Solution, a sort of super-thin-client set of kit. I was test-driving the company's first-generation hardware and a software suite two versions behind the latest release. I've now had a chance to review the second-generation hardware with its latest software, and I …
Trevor Pott, 08 Oct 2012
The Register breaking news

Online bank punters tricked into approving theft of their OWN CASH

Security researchers have discovered a malware-based attack against the chipTAN system used by bank customers in Germany to authorise transactions online. The chipTAN system involves the use of a card reader into which a chip-n-PIN bank card is inserted, which generates a transaction authentication number (TAN) used to green- …
John Leyden, 06 Sep 2012
management cloud4

McAfee: Not all partners are cut out to be SaaS providers

UK channel partners "need a lot of handholding" when it comes to software-as-a-service solutions, EMEA president Gert Jan Schenk has said. Speaking to El Chan at the McAfee EMEA Channel Summit, Schenk said that software-as-a-service was something the firm was introducing "carefully" in Blighty. "Cloud is a buzzword and …