Articles about Ip

UAE

Don't use a VPN in United Arab Emirates – unless you wanna risk jail and a $545,000 fine

A royal edict from the president of the United Arab Emirates (UAE) may have effectively made it illegal for anyone in the country to use a VPN or secure proxy service. Those caught could face jail time and fines of between 500,000 and 2,000,000 UAE dirham (US$136,130 and $544,521). The change was announced this week by the UAE …
Iain Thomson, 28 Jul 2016

Hybrid Cloud: The new IT service platform?

So. Hybrid cloud. Let's start with a quick definition, courtesy in this case of TechTarget which describes it as: “a cloud computing environment which uses a mixture of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms”. I like this particular definition as it sums it …
Dave Cartwright, 28 Jul 2016
Close up of etched silicon

Brit chip bods ARM quietly piling up cash. Softbank will be happy

Cambridge-based processor design business ARM has posted substantial revenue and profit increases for the months in the runup to the Brexit vote. The company being bought by Japanese megacorp Softbank for £24.3bn, though Softbank has promised that this will be a Brexit in ownership only. ARM will retain its "senior management …
Russian hacking

Did the Russians really hack the DNC or is this another Sony Pictures moment? You decide

Poll Security intelligence firm ThreatConnect thinks it has found a smoking gun that links the leaked US Democratic Party emails to Russian hackers. The biz has analyzed the communications methods used by Guccifer 2.0, which is thought to be a team of miscreants who obtained the somewhat embarrassing internal emails and gave them …
Iain Thomson, 27 Jul 2016

BlackBerry's licensing strategy looks smart – and a lot like Nokia's

Analysis BlackBerry didn’t show a new phone in New York City at its annual Security Summit last week, and CEO John Chen sounded a bit fed up that the assembled press corps kept asking about phones. But there was enough in his comments to glean how BlackBerry’s device strategy has evolved - and it’s following a familiar path taken by once …
Andrew Orlowski, 25 Jul 2016

How to make the move from ISDN to SIP

ISDN is fast becoming a technology of the past. Today's telcos have networks that bypass traditional telephony signalling technologies for IP networks: the hardest thing they do is present a “legacy” connection such as an analogue line or an ISDN connection to a customer, as layering a non-IP service on an IP network is non- …
Dave Cartwright, 25 Jul 2016
phishing_648

Clash of Kings hack: 1.8m hit

The forums for hit mobile game Clash of Kings have been hacked, with 1.6 million usernames, email addresses, IP addresses and access tokens swiped, apparently. Account passwords were also taken but they were stored salted and hashed, we're told. The forums have since been taken offline for "maintenance." Clash of Kings is …
Team Register, 23 Jul 2016

Apple, Facebook and Coinbase coughed data to finger alleged pirate king

The United States case against alleged Kickass Torrents (KAT) boss Artem Vaulin is built on data obtained from Apple, Facebook and Coinbase. The criminal complaint (PDF) against Vaulin details how the U.S. Department of Homeland Security, Immigration and Customs Enforcement conducted a lengthy online probe into the alleged …
Simon Sharwood, 22 Jul 2016

IETF boffins design a DNS for digital money

Digital currency engineers are working on a domain name system (DNS)-style protocol to enable money to be shared across different networks. The idea of digital currency – and particularly blockchains – has taken off in recent years, but there remain a number of competing networks that are unable to talk to one another: the …
Kieren McCarthy, 21 Jul 2016

Official: AMD now stands for Avoiding Miserable Death

AMD fans are over the moon today as their favorite processor designer has sold more chips than expected in the three months to June 25. The Sunnyvale, California, biz beat analysts' estimates on revenue and earnings per share in a billion-dollar quarter that ended in the black rather than the usual red: the Radeon maker banked …
Chris Williams, 21 Jul 2016
Downtime, outage

BT customers hit by broadband outage ... again

BT customers in the UK are once again banging their heads against their keyboards this morning: a power outage has thrown them offline for the second day running. Today the issue is a power outage at Telehouse North in London. An email message from BT Wholesale, with the subject line 'Major Service Interruption' – seen by The …
Kat Hall, 21 Jul 2016

Alleged skipper of pirate site KickAss Torrents keel-hauled in Poland

The world's favourite torrent website, KickAss Torrents, is down and out with Polish cops arresting its alleged operator Artem Vaulin. Kickass rose to prominence after the scuppering of The Pirate Bay and attracted more than 50 million unique visitors a month. That level of traffic made it the 69th most frequently-visited …
Darren Pauli, 21 Jul 2016
Woman holds up PBX phone in office. Pic by Shutterstock

Really Scary Telecoms Stuff? Nah – telephony's just an app

In 2009, I moved to Jersey to become the network and telecoms manager for a multinational company. It was tremendous fun, as I had a variety of kit to play with. I tended to favour the Mitel 3300 ICP range (still do, actually) that supported about half of our offices, and I did the various engineer courses and exams for the …
Dave Cartwright, 20 Jul 2016

Handover of US internet control to ICANN officially blocked in Republican policy

The planned transition of the internet's critical technical functions from the US government to a technical body may come under further attack after the Republican Party officially agreed to block it on Monday. The Republican Platform for 2016 [PDF] was formally approved during a chaotic first day of the party's national …
Kieren McCarthy, 19 Jul 2016

15-year-old security hole HTTPoxy returns to menace websites – it has a name, logo too

A dangerous easy-to-exploit vulnerability discovered 15 years ago has reared its head again, leaving server-side website software potentially open to hijackers. The Apache Software Foundation, Red Hat, Ngnix and others have rushed to warn programmers of the so-called httpoxy flaw, specifically: CVE-2016-5385 in PHP; CVE-2016- …
Darren Pauli, 18 Jul 2016
Man loads in blanket into the washing machine. Photo by Shutterstock

Facebook and Google show how the world really will be blanketed in 5G

Facebook has outdone even Google recently, in its efforts to shake up the mobile industry and accelerate the delivery of broadband services (and its revenue generators) to the entire planet. This is no longer just about using balloons and new spectrum to push affordable wireless access to underserved communities. It is about …
Wireless Watch, 18 Jul 2016

Euro IP study finds 25 Tor-and-Bitcoin-loving pirate business models

Knock us over with a feather: a study by the European Union Intellectual Property Office (EUIPO) has found that those who infringe intellectual property for a living are quite fond of anonymity technologies that cover their tracks. The Office last week emitted a Deloitte-penned study titled Research on Online Business Models …
Simon Sharwood, 18 Jul 2016
image byemo http://www.shutterstock.com/gallery-2659924p1.html

Security firm clarifies power-station 'SCADA' malware claim

Malware hyped as aimed at the heart of power plants is nothing of the sort according to security outfit Damballa, which has put its name to analysis claiming the "SFG" malware is run-of-the-mill code without sufficient smarts to target SCADA systems. The so-called SFG malware is the spawn of Furtim, and hit headlines as …
Darren Pauli, 18 Jul 2016
Happy penguin, image via Shutterstock

Ubuntu forums hacked

Ubuntu maker Canonical says that its Linux distro's user forums have been hacked, and the usernames, IP addresses, and email addresses of roughly 2 million users have been swiped. Canonical CEO Jane Silber said no passwords were taken via an SQL injection attack, and that the miscreants did not appear to have accessed any …
Shaun Nichols, 15 Jul 2016
Defeated-looking young man puts his head against table in front of laptop and pile of papers in conference room. Pic via Shutterstock

IPO spews email addresses to hundreds of recipients. Twice

The department entrusted with the protection of corporate data is seemingly somewhat less bothered when it comes to guarding personal info. The Intellectual Property Office yesterday made the classic schoolboy error of sending out an email containing hundreds of recipients in the 'to' field. Realising its blunder minutes …
Kat Hall, 15 Jul 2016
Cabling disaster 3

It's neat having speedy, flashy boxen but they need connecting, too

HPC Blog The next big battle ground in High Performance Computing, and thereafter in large enterprise computing, will be centered on high performance interconnects (HPI). These are the mechanisms that tie systems together and enable high speed communication between nodes. The HPI market is the very high-end of the networking equipment …
Patchwork

Juniper's bug hunters fire out eight patches

Juniper has fired off fixes for eight security vulnerabilities. The company has been running Junos OS through the security mill since late last year, when its now-notorious backdoor hit the headlines. Junos OS systems running either generic routing encapsulation (GRE) or IP-in-IP (IPIP) tunnels are vulnerable to a kernel …
scrooge

Generous Fiat Chrysler offers $1,500 for car security bugs – or two minutes of annual profit

Fiat Chrysler has finally got around to offering a bounty on bugs found in its cars. But the scheme is unlikely to get any takers considering the pitiful amount of money on offer. Last year car-hacking artistes Charlie Miller and Chris Valasek took remote control of the engine, brakes, and minor systems of such Fiat Chrysler …
Iain Thomson, 13 Jul 2016
China keyboard, image via Shutterstock

Qualcomm's China JV licences ARMv8-A for server CPUs

Huaxintong Semiconductor Technology, the joint venture between Qualcomm and China's Guizhou Province, has advanced its ambition to build ARM-based server silicon by licensing the ARMv-8-A architecture. Guizhou province has set itself up as a centre of excellence for big data and internet infrastructure. Top-tier Chinese telcos …
Simon Sharwood, 13 Jul 2016

Free concert! Against TPP?

Internet advocacy group Fight for the Future will host a series of music concerts in Denver, San Diego, Seattle and Portland – to protest the Trans Pacific Partnership (TPP) trade agreement. The Rock Against the TPP idea has been joined by the Electronic Frontier Foundation (EFF) and a number of musicians, including guitarist …
Kieren McCarthy, 12 Jul 2016
sale_648

Reuters flogs IP for $3.55bn

Thomson Reuters is selling off the intellectual property and science arm of its business for $3.55bn in cash. The business, which provides information and related services to companies, universities and governments, has 3,200 employees and will be sold to private equity firms Onex Corporation and Baring Private Equity Asia. …
Kieren McCarthy, 12 Jul 2016
Password

Purloined password re-use checker pees in the security soup

Lazy password reusers are at even higher risk of having accounts compromised following the publication of a proof-of-concept tool that can quickly test credentials against a host of sites. The work is the penmanship of Netsuite security bod Philip O'Keefe who uploaded his tool dubbed Shard to GitHub. Shard tests shared …
Team Register, 12 Jul 2016

China really wants to get its hands on Idaho's 3D NAND tech

China is looking to license 3D NAND technology from Micron. Beijing wants to free itself of dependence on US, Korean and Japanese memory technologies by building its own, indigenous capability. A report in Chinese-language publication Commercial Times, referenced by DigiTimes, says Tsinghua Unigroup is allying with Wuhan …
Chris Mellor, 11 Jul 2016
Businessman looks at abstract painting overlaid with server room... he is possibly thinking of or conceiving of a storage/compute concept. Photo by Shutterstock

Apeiron claims NVMe fabric speed without NVMe over fabrics - but how?

Backgrounder Apeiron Data Systems' external ADS1000 array uses NVMe media to deliver block storage access using NVMe over Ethernet (NOE) but not NVMe over fabric technology, (NVMeF) which can use Ethernet. How does this subtle distinction work and what is the difference between NOE and NVMeF? NVMeF is a way of using the NVMe protocol, …
Chris Mellor, 08 Jul 2016

Wannabe Prime Minister Andrea Leadsom thinks all websites should be rated – just like movies

The UK's possible future prime minister thinks all websites should be classified with minimum age ratings, just like films. Andrea Leadsom is one of two candidates left in the race for the leadership of the Conservative Party; the winner of which will become the country's Prime Minister. Although many are concerned with the …
Kieren McCarthy, 08 Jul 2016
UN building, photo via Shutterstock

WIPO chief trying to 'fix the composition of the Staff Council' – lawyer

WIPO's director general Francis Gurry is seeking to strengthen his hold on the UN’s global IP group by getting rid of its staff council. A lawyer for the council, Matthew Parish, has written to all United Nations ambassadors expressing concern over Gurry's attempts to alter the composition of the body, whose most recent …
John Oates, 06 Jul 2016
By Bob Bob - https://flic.kr/p/914kty

5 years, 2,300 data breaches. What'll police do with our Internet Connection Records?

Police forces across the UK have been responsible for “at least 2,315 data breaches” over the last five years, according to research by Big Brother Watch, prompting concerns about the increasing amount of data they're holding. Titled Safe in Police Hands? the 138-page report is released today after months of requests made by …

Researcher pops locks on keylogger, finds admin's email inbox

Trustwave researcher Rodel Mendrez has gained access to the inbox of the criminal behind a commercial keylogger used to attack industries including finance, cloud services, logistics, foreign trade, and government. Mendrez's reverse engineering effort found credentials buried within the Hawkeye keylogger that lead through …
Darren Pauli, 05 Jul 2016

ICANN pushes back against brand lobby

ICANN has stiff-armed the content lobby, writing that it's not responsible for what people do with domains registered through the international registration hierarchy. While it agrees that registries that fail to include abuse warnings in their terms and conditions need to be brought to heel, ICANN's chair Dr Stephen Croker …

700,000 Muslim Match dating site private messages leaked online

Hackers have leaked the personal details of 150,000 users of the Muslim Match website after breaking into the niche dating portal. Almost 150,000 user credentials and profiles, as well as more than 700,000 private messages between users, were posted online. "These private messages cover a range of subjects from religious …
John Leyden, 01 Jul 2016
Cartoon - Private SNAFU

Telstra's business network in six-hour collapse

Telstra is red-faced yet again, after suffering a long outage centred in Victoria. The TITSUP (Total Inability To Support Usual Performance) began around 2pm on June 30, and it was six hours before Telstra reported services back online. On the way, the outage forced airline Jetstar to manually process passengers at …

Hackers: Ditch the malware, we're in... Just act like a normal network admin. *Whistles*

Hackers almost exclusively use standard network admin tools to move around a compromised network once they’ve broken in using malware or other hacking techniques. Researchers at security startup LightCyber found that 99 per cent of post-intrusion cyberattack activities did not employ malware, but rather employed standard …
John Leyden, 30 Jun 2016

Big Blue finds big green in derailing transport

The transport sector is a booming lucrative playground for cyber criminals that is increasingly fragmented, IBM researchers say. The findings in a report Security trends in the transportation industry reveal that airlines, trucking, and parking sector companies are being hosed for credit cards and sensitive information. Big …
Team Register, 30 Jun 2016

Internet takes another step away from US govt and into ICANN's hands

The internet's move away from US government control took a significant step forward Wednesday with the signing of a new contract. The agreement between DNS overseer ICANN and the five regional internet registries (RIRs) AFRINIC, APNIC, ARIN, LACNIC and RIPE covers the provision of public IP addresses across the internet – a …
Kieren McCarthy, 29 Jun 2016
axon 7

ZTE flagship elbows aside Xiaomi

Xiaomi was expected to be the biggest arrival into the European phone market this year, but ZTE may have just grabbed the laurels. While Xiaomi is entangled with IP worries, delaying a European push, ZTE has steamed in with an attractive Android flagship, the Axon 7 - launched this week in Paris this week - one that you can …
Andrew Orlowski, 29 Jun 2016
Sun shines on the clouds. Photo by Shutterstock

Brexit, schmexit: BT and Oracle join hands for a cloudy tryst

BT has hopped into bed with Oracle in a deal that promises to provide the underlying network connectivity for Oracle’s hybrid cloud. BT Cloud Connect for OracleFastConnect is built on BT’s IP Connect virtual private network (VPN) and will link customers' on-premises IT to Oracle data centres in London or Amsterdam. The deal …
Kat Hall, 29 Jun 2016
Cookies

Google off the hook for feeding kids bad cookies

A US court has dismissed Google from a lawsuit accusing the advertising giant of illegally tracking small children online. The US Third Circuit Court of Appeals said the Chocolate Factory will not [PDF] have to face allegations it used information about youngsters to serve them customized ads without their parents' knowledge …
Shaun Nichols, 29 Jun 2016

Europe's UK-backed Unified Patent Court 'could be derailed'

Europe's multi-million-pound Unified Patent Court could be derailed entirely following the UK's decision to leave the EU. The court was planned to open in 2017 and was intended to hear cases regarding infringements of European patents across EU member states. Only full membership of the EU allows countries to participate in …
Kat Hall, 28 Jun 2016
Venomous snake

Nuclear goes boom

Shake-ups at the top of the exploit kit world continue, with news the world's two top pop boxes have disappeared. Exploit kits are the all-in-one commercial crime offerings through which specifically vulnerable users can be targeted with a barrage of constantly updated and occasionally zero-day attacks. Victims subject to …
Darren Pauli, 28 Jun 2016

25,000 malware-riddled CCTV cameras form network-crashing botnet

A massive network of hacked CCTV cameras is being used to bring down computers around the world, we're told. The unusual 25,000-strong botnet was apparently spotted by US security outfit Sucuri when it investigated an online assault against an ordinary jewelry store. The shop's website was flooded offline after drowning in 35 …
Iain Thomson, 28 Jun 2016
Logs and an axe

Parliament takes axe to 2nd EU referendum petition

Analysis A petition to nullify the UK’s EU referendum and hold another appear to be riddled with fraudulent data. Raw data examined reveals that many of the participants come from outside the UK, or use IP addresses outside the UK. Only UK or British citizens and residents can create or sign a petition, according to the rules. You can …
Andrew Orlowski, 27 Jun 2016

Time to re-file your patents and trademarks, Britain

Brexit Businesses will likely need to re-file their patents and trademarks in the UK following the Brexit vote, leading intellectual property lawyers have warned. The decision to leave the European Union puts a big question mark over "automatic EU-wide IP protection," says patent law specialist Iain Connor of Pinsent Masons, writing …
Kieren McCarthy, 24 Jun 2016
data

Brexit and data protection: A period of shock and reflection

BREXIT What price the UK's secession from the European Union? “It's far too soon to tell,” has been the sober and much-repeated line of legal and privacy professionals following the United Kingdom's referendum which voiced public opinion to leave the European Union. Speaking to The Register this morning Andrew Joint, commercial …

Judge rules FBI can hack any time, any, place, anywhere

A federal district court in Virginia has ruled that the FBI has the right to hack into computers around the world without getting a local warrant, and without any review by courts. The ruling, by US District Judge Henry Morgan, comes during the prosecution of Edward Matish. Matish is one of the 100-plus suspects arrested …
Iain Thomson, 24 Jun 2016

Dutch court says BREIN should get e-book uploaders' names

A Netherlands court has ordered two Usenet providers, Eweka and Usenetter, to hand over subscriber details over alleged copyright violations. The case was launched by anti-piracy group BREIN, which is trying to hunt down whoever uploaded more than 2,000 e-books to Usenet via the providers. Eweka and Usenetter cancelled the …