Feeds

Articles about Endpoints

Don't lose control of those fast-breeding endpoints

So you want to know about security? Well you have come to the right place. I have been here for a while and I can tell you that outside these gates it’s full of cowboys, sharks and pirates, none of whom will hesitate to take what is yours and call it their own. The above is is a quote from a brochure I wrote in an attempt to …
Aaron Milne, 22 Oct 2013
Fastpass logical diagram

Kill queues for fast data centres: MIT boffins

MIT researchers hope to speed up networking inside the data centre with concepts that will look familiar to old networking hacks: they propose a central arbiter for network traffic that picks out a predetermined path before a packet is transmitted. The boffins call the scheme Fastpass, and its other characteristic is that the …
Instasheep

Thwarted dev sets Instasheep to graze on Facebook accounts

London developer Stevie Graham has built an Instagram stealer dubbed Instasheep that can hijack accounts over public networks. Graham (@stevegraham) published Instasheep - a play on the 2010 Facebook stealer Firesheep - after claiming Facebook refused to pay a bug bounty for his reported flaws affecting the Instagram iOS app. …
Darren Pauli, 30 Jul 2014
Bitdefender security image

Flaws found in Bitdefender enterprise endpoint manager

Holes have been reported in Bitdefender's Gravity end-point protection platform that allow hackers to target corporate infrastructure. Researcher Stefan Viehbock of SEC Consult Vulnerability Lab said the flaw affecting the latest version provided an entry point for attackers to move laterally through the network. "Attackers are …
Darren Pauli, 17 Jul 2014

Google brazenly strokes its mobile cloud tools just before Amazon shindig

Google has released two mobile development tools to coax app writers into storing data in the ad giant's cloud services. The unveiling comes a day before the kickoff of cloud-rival Amazon's AWS:Reinvent, a love-in held in Las Vegas. Google's utilities give developers two ways to tie applications into cloud storage and compute …
Jack Clark, 11 Nov 2013
Azure icon

Got to get something started with Azure VMs? Microsoft's Planky shows you the way

Steve Plank, or "Planky" as even his mother allegedly calls him, is the Windows Azure evangelist for Microsoft UK and on 23 April he is taking to the interwebs to conduct his evangelizing online. Join Planky in a one-hour webcast starting at 9:30 BST and let him guide you through the step-by-step process for spinning up Windows …
David Gordon, 15 Apr 2014
bug on keyboard

Cisco slurps security scanner

Cisco has continued the expansion of its security portfolio with the acquisition of malware analysis outfit ThreatGRID. The acquisition target was founded in 2012, one of the then-burgeoning number of companies that pushed malware analysis, threat intelligence, and security analytics into the cloud (supplemented by an on-premise …
Amazon founder and CEO Jeff Bezos

THE GERMANS ARE CLOUDING: New AWS cloud region spotted

Amazon looks set to open a data center in Germany, allowing European developers to access Bezos & Co's rentable computer tech with lower latencies. Evidence first gathered by a manager at a Berlin-based startup and subsequently verified by El Reg indicates that Amazon's next cloud computing data center may be in Frankfurt, …
Jack Clark, 07 Jul 2014

Why hackers won't be able to hijack your next flight - the facts

Two seasoned pilots, one of whom is a published hacking expert, have been puncturing some of the myths about aircraft hacking at Defcon 22. Dr. Phil Polstra, professor of digital forensics at Bloomberg University (and a qualified commercial pilot and flight instructor) and "Captain Polly," professor of aviation at the University …
Iain Thomson, 10 Aug 2014
named data networking

DEATH TO TCP/IP cry Cisco, Intel, US gov and boffins galore

The US National Science Foundation, Cisco, Verisign, Panasonic and boffins from around the world have thrown their weight behind a new “Named Data Networking Consortium” that aims to develop “a practically deployable set of protocols replacing TCP/IP that increases network trustworthiness and security, addresses the growing …
Simon Sharwood, 05 Sep 2014
The Register breaking news

Google App Engine update eases cloudy mobile app development

Google has updated its platform-as-a-service to ease mobile app development in the cloud. The "Cloud Endpoints" feature was pushed out in its preview form by Google on Thursday, along with support for the Java 7 runtime on its App Engine platform-as-a-service. "Cloud Endpoints gets rid of all the plumbing code associated with …
Jack Clark, 22 Feb 2013
Rosetta Flash diagram

Weaponised Flash flaw can pinch just about anything from anywhere

Get cracking with the latest Flash upgrade, because the vulnerability it patches is a peach, allowing a cross-site request forgery (CSRF) attack for stealing user credentials. According to the Switzerland-based Google engineer that turned up the vulnerability, Michele Spagnuolo, sites that are/were vulnerable to the attack …

Aaah-CHOOO! Brit boffins say WiFi can 'sneeze' malware

While the "head cold" metaphor is a bit laboured, the issue is genuine: a group of researchers from the University of Liverpool have found that WiFi access points are highly efficient at passing around virus infections. Likening the spread of computer viruses over WiFi as akin to the spread of human viruses in the air, the …
Kaspersky Lab logo

Kaspersky's Security for Virtualization pushed to XenServer and HyperV

Kaspersky is extending its Security for Virtualuzation Light Agent security tool to the Citrix XenServer and Microsoft HyperV platforms. The company said that the Light Agent tool will launch on April 22 with XenServer and HyperV support as well as new options for VMware's vSphere hypervisor. The company will continue to …
Shaun Nichols, 15 Apr 2014
bug on keyboard

Infosec bods try Big Data in search for better anti-virus mousetrap

Infosec house Panda Security is looking to Big Data and application monitoring as a means to achieve better malware detection. The launch of Panda Advanced Protection Service (PAPS) is a response to the widely known shortcomings of signature-based anti-virus detection as well as a means for Panda to sell extra services. The …
John Leyden, 20 Jun 2014
ANU student with quantum comms apparatus

'Software amplifier' boosts quantum signals

Even in quantum communications, adjusting the parameters of Shannon's Theorem can help improve reach and range. A group of Australian National University (ANU) researchers has found a way to extend the reach of quantum communications by improving the signal-to-noise ratio of quantum systems. Their work, published in Nature …
balaclava_thief_burglar

Cisco: Hey, IT depts. You're all malware hosts

Everybody – at least every multinational that Cisco checked out for its 2014 Annual Security Report – is hosting malware of some kind, and there aren't enough security professionals to go around. Along with its Managed Threat Defense service launched this week, Cisco also launched the latest publication (here with registration) …

Bogus Firefox add-on FORCES WITLESS USERS to join vuln-hunting party

Cybercrooks have brewed up a botnet that uses a bogus Firefox add-on to scan the web for hackable websites. The so-called Advanced Power botnet runs SQL injection attacks on websites visited from infected machines. The malware, disguised as a legitimate add-on for Mozilla Firefox, found its way onto 12,500 systems, reports …
John Leyden, 17 Dec 2013

Trustwave gobbles up Application Security, gorges itself on tech

Data security biz Trustwave has acquired fellow data security provider Application Security, a startup that specialises in automated database security scanning technologies. Financial terms of the deal, announced on Monday, were undisclosed. Privately-held Application Security develops security software for relational databases …
John Leyden, 12 Nov 2013
Sony Ericsson C702

Tinfoil hats proven useless by eleven-year mobe radiation study

A long-term longitudinal study in the UK has concluded that mobile phones are safe, with the publication of a report finding “no evidence of biological or adverse health effects” from using mobiles. The second MTHR (Mobile Telecommunications and Health Report) study is a follow-up to a prior report published in 2007. The report …
management strategy2

As Azzurri closes in on CEO successor, sales director splits

South coast integrator Azzurri Communications is going to be a sales director and board member lighter after Craig Wellman handed in his notice to split by the early summer. The business, which last month pushed out the first in a series of cloudy services, is still on the hunt for a CEO to replace outgoing chief Vim Vithaldas …
Paul Kunert, 07 Apr 2014
The Register breaking news

Rotten hackers feast on mouldy Java flaws

Most enterprise networks are riddled with vulnerable Java installations, according to a new study whose release coincides with the discovery of another 0-day Java flaw. Less than one per cent of organisations are running the latest version of Java, according to a study by security software firm Bit9. The most frequently …
John Leyden, 22 Jul 2013

They've taken my storage hostage ... now what?

There's an encrypting ransomware Trojan making the rounds called Cryptolocker. I will save the details on my battle with this beastie for later*, but suffice it to say that if this encrypts your stuff you are done. There is no getting your data back unless you have backups or pay the ransom. Let's set aside the ultra-well …
Trevor Pott, 24 Oct 2013
Dell Boomi Atom logo

The real reason why Dell wants to go private: To fondle big Boomis

Dell has added an API management tool to its Boomi platform, which connects up clouds and in-house applications. The new component - which monitors and controls software interfaces used to hook together various services within an enterprise - is included in an upgrade that also adds new integration and process management …
Jack Clark, 07 May 2013
Volcano erupting

Two years in the making: Sneak peek at VMware's future VVOL tech

VMware says its virtual volume storage technology – which has spent two years in development – is set to erupt onto the storage array landscape next year, causing profound changes for array controllers. Virtual volumes or VVOLs provide storage for VMware virtual machines (VMs) that currently need LUN (Logical Unit Number) or …
Chris Mellor, 14 Jul 2014
Photographic plate image of the colliding galaxies NGC 6769, 6770, and 6771.

IBM opens 'JumpGate' code to help devs navigate among clouds

IBM has developed a tool to tackle fragmentation in the cloud management ecosystem, and hopes its approach will encourage more providers to support OpenStack-based applications without having to run OpenStack. The "JumpGate" technology was announced by SoftLayer engineer Nathan Beittenmiller in a blog post on Thursday, and sees …
Jack Clark, 07 Feb 2014

How long is too long to wait for a security fix?

Synology quietly released version 4.2-3250 of its DiskStation Manager (DSM) operating system this month. This squashes critical security bugs in version 4.2 of DSM – bugs that were fixed in version 5.0 in June, so consider this a back port. Version 4.2 is old but still in use in various models, such as the DS109. The update got …
Trevor Pott, 25 Jul 2014
REM's Shiny, Happy People

VDI a 'delightful' experience... Really?

The VDI talk was the kind of GTC session I love. It’s where a real-world expert talks about how a difficult task is actually accomplished. Not the theory, not how it should work on paper, but what it takes to actually move a project from Point “A” to Point “We’re done with this”. Ken Fingerlos from Lewan Technology delivered in …

Firewall-floggers in FLAMING MESS: Where'd our mystery margin go?

If you work in the fields of technology distribution, services and resale, you'll surely hear about cloud, mobile, social and virtual more than anything else. However, it is the changing patterns in security spending that are perhaps most dramatically re-shaping our businesses. Gone are the good old days of pushing traditional …
Dambuster_Mohne_dam_breach

Puff on a hybrid – next thing you know, you're hooked on a public cloud

I had a flash of inspiration today. Hybrid public-private cloud systems are becoming a gateway drug to pure public clouds. Why is this an arguable view? Let’s look to the ideas discussed within The Big Switch, written by Nicholas Carr. In his seminal book, Carr argues that a public IT utility provider will provide CPU cycles and …
Chris Mellor, 11 Apr 2014
The Register breaking news

Are you in charge of a lot of biz computers? Got Java on them?

Java security vulnerabilities - exploited to hack Apple and Facebook this month - are rife across business computers worldwide, according to new research. The overwhelming majority (94 per cent) of PCs and other endpoints running Java software and surveyed by Websense are vulnerable to at least one Java runtime exploit, …
John Leyden, 26 Mar 2013
Cloud security

CloudBees straddles firewall with VPN connection

Cloud startup CloudBees has launched a technology that lets customers of the developer-oriented cloud connect their sensitive on-premises resources to the company's cloud via VPN. By building hosted OpenVPN into its infrastructure, the Java cloud has been able to launch the service which it says can assuage security concerns and …
Jack Clark, 23 Sep 2013
nuts

Promisec Endpoint Manager: So we gotta cope with BYOD... Help!

The explosion of internet-connected gadgets, sensors and other devices that underpins the "internet of things" concept makes my head hurt. When combined with the completely new security model presented by IPv6, BYOD and cloud computing, automation of endpoint management is rapidly becoming non-optional. I've started taking a …
Trevor Pott, 18 Jul 2013

MS brandishes 'Katana' HTTP/2.0 server

Microsoft has gone public with a prototype HTTP/2.0 server. The server is designed to implement the version 4 HTTP/2.0 implementable draft published by the IETF earlier in July. The idea, according to IETF HTTPBIS chair Mark Nottingham, is that progressive implementations of HTTP/2.0 will feed back into the standard. “We're …
Beached whale

Beached whale Symantec watches revenues recede 7%

Symantec’s latest results show that you can wring more profit out of declining revenues by slashing costs but its not enough to bring you back to growth. Revenues in its fourth fiscal quarter of 2014 ended 28 March were $1.63bn, seven per cent down year-on-year, but net profit jumped 14 per cent to $217m. The full year numbers …
Chris Mellor, 09 May 2014

A Tapestry of network complexity

Forget drawing network maps or sending your network management software on an epic tour of auto-discovery: a group getting ready to launch an open-source “network complexity scoring” tool says it's all about the endpoint. Infoblox, part of the Flowforwarding.org SDN (software defined networking) community, is prepping the ground …

Reports: NSA has compromised most internet encryption

The NSA and the GCHQ have compromised much encryption used on the internet through a potent mix of technological theft, spycraft, and collaboration with major technology companies, according to new reports. In a series of news articles that highlight how the code-breaking crypto-fiddling agencies NSA and GCHQ are doing their job …
Jack Clark, 05 Sep 2013

Microsoft: We're making ONE TRUE WINDOWS to rule us all

Microsoft has cracked open its annual and Q4 results, the first end of year numbers it has spat out under brevity-challenged chief executive Satya Nadella. As befitting such a results event, there was plenty of backslapping and self-congratulatory talk about how Microsoft is turning into a cloud business. But why was Microsoft’ …
Gavin Clarke, 23 Jul 2014
iPad Psycho image

NUDE SELFIE CLOUD PERV menace: Apple 2FA? Sweet FA, more like

Apple’s two-factor authentication doesn't actually protect iCloud backups or photo streams, contrary to what many iPhone and iPad fondlers might wish to believe. Scores of (mostly female) celebrities, including Oscar winner Jennifer Lawrence, had their iCloud hacked before miscreants siphoned off private nude snaps which …
John Leyden, 03 Sep 2014
A3CUBE's RONNIEE scheme

The SECOND COMING of Virtensys: HPC boffins turn PCIe into in-memory network

HPC boffins at startup A3CUBE have picked up where Virtensys left off and designed a way to use PCIe interfaces to provide direct shared global memory across a network with lower latency and higher scalability than Ethernet, InfiniBand and Fibre Channel. San Jose-based A3CUBE was founded by in 2012 by Emilio Billi, its chief …
Chris Mellor, 25 Feb 2014
The Register breaking news

AWS peers into soul of Load Balancers for DNS failover

Amazon Web Services now lets users apply automated DNS failover policies to data fronted by load balancers rather than just IPs. As El Reg predicted, Amazon has now added Elastic Load Balancer (ELB) failover to Route 53 just three months after launching a new auto-redirect feature. This means Amazon's "dead man switch" failover …
Jack Clark, 31 May 2013
Sleep Cycle iOS app screenshot

Where the HELL is my ROBOT BUTLER?

For decades the development of the computer has been driven by businesses. Businesses bought mainframes, PCs and servers. They bought in such quantity that the consumer was, for most technology companies, a mere afterthought. Today, consumer purchases of endpoints outstrip business purchases by a wide margin. None of this is …
Trevor Pott, 04 Apr 2014
GEC PABX 3 switchboard and operator

Soft, hard, lightly hosted? Make the right call when you choose a PBX system

All businesses need a PBX phone system to organise calls and direct them round the organisation. PBX systems have evolved over the last couple of decades. While some companies may still be using expensive physical switchboards, they can now also choose a hosted PBX system, either with hardware provided by a hosting company or a …
Eira Hayward, 28 Mar 2014
Netflix on TiVo

TV transport tech, part 2: From sofa to server at the touch of a button

These days telly addicts are spoilt for choice with a wealth of services on offer, but what’s behind it all? To find out, The Register was given exclusive access to Virgin Media’s Central Headend – the mothership of its TV services across the UK. Part one covered receiving and redistributing content from disparate sources to …
Bob Dormon, 22 Aug 2014
The Register breaking news

A backdoor into Skype for the Feds? You're joking...

Heavyweights of the cryptographic world have lined up behind a campaign against proposed US wiretapping laws that could require IT vendors to place new backdoors in digital communications services. Technical details are vague at present, but the planned law could mandate putting wiretap capabilities in endpoints to cover …
John Leyden, 21 May 2013
The Register breaking news

Google plumps up one-click mobile cloud

Google is tightening the links between its cloud services and the Android mobile OS to help it woo developers into its rentable infrastructure with a new service for deploying mobile apps onto its cloud. With the release of the Mobile Backend Starter on Monday, the Mountain View Chocolate Factory unwrapped a tech that takes the …
Jack Clark, 03 Jun 2013
Apple Maiden data center storage

Services fuel the next generation data centre

In its basic form, a data centre is just a big room full of cages and cabinets, with highly reliable power, efficient security, fire and flood protection and a variety of internal and external network connectivity. In recent years providers have tried to differentiate their offerings but there is not really that much you can do …
Dave Cartwright, 17 Nov 2013
Zombie cloud

New NSA leak reveals invasion of the management consultants

The Register can reveal that while the NSA has been infiltrating the highest echelons of the governments of US allies, a counter-infiltration has taken place. Crack teams of Microsoft marketing droids, sleeper cells of incognito TEDx speakers and the greatest sociologists ever to torture a syntax into confessing to crimes of …
The Register breaking news

Microsoft embraces Android with Azure Mobile Services update

Microsoft has added support for Android apps into Windows Azure Mobile Services, letting developers programmatically add authentication and push notifications. The updates were announced by Microsoft on Tuesday, and follow Google's release of a similar range of mobile updates for its cloud in mid-February. To let Azure support …
Jack Clark, 05 Mar 2013
The Register breaking news

MIT boffins give computers control to clock faster TCP

A group of MIT researchers has unveiled a machine learning approach to TCP congestion which could form the foundation of the next round of improvements to the venerable protocol's performance. Dubbed “Remy”, their TCP control software is based on the idea that even sophisticated modern congestion control algorithms (like …