Articles about Prevalence

Fake election news meltdown vortex sucks in Google

Google has been sucked into the post-election scapegoat meltdown after it displayed a fake news story at the top of its rankings for election result searches. Early on Monday, internet users were surprised to discover that while trying to find the latest on the US elections (they are still counting ballots), the top Google …
Kieren McCarthy, 14 Nov 2016
CSIRO Parkes Radio Telescope

Gaming is not as addictive

The first large-scale research attempting to measure the extent of internet gaming addiction has found ... not very much. An Oxford University study suggests that playing online games is not as addictive as gambling. The study represents an effort to evaluate the extent of "internet gaming disorder," added to the fifth edition …
Thomas Claburn, 04 Nov 2016
Archer cracks the ISIS mainframe's password

Is password security at just $1/month too expensive for most?

With major breaches regularly turning up a prevalence of laughably predictable passwords, you'd think that the likes of password locker LastPass should find it easy to sell its wares for US$1 a month. But even that price looks to be a hard sell: why else would the company have taken features from its Premium product and made …
Simon Sharwood, 04 Nov 2016
Kids car snow, image via Shutterstock

Windows 10 market share stalls after free upgrade offer ends

Windows 10's market share has stalled, according to all three of the traffic-measurement tools The Register tracks at the start of each month. Our three sources are Netmarketshare, StatCounter and analytics.usa.gov. All three investigate web traffic to determine operating system prevalence, with the third source only …
Simon Sharwood, 02 Nov 2016

Yahoo! couldn't! detect! hackers! in! its! network! but! can! spot! NSFW! smut! in! your! office?

Having laid bare over half a billion usernames and passwords through meager funding and witless indifference, Yahoo! is putting its faith in artificial intelligence to protect people from bare skin. Yahoo! engineers Jay Mahadeokar and Gerry Pesavento in a blog post on Friday said the company has released an open-source model …
Thomas Claburn, 30 Sep 2016
Irritated man looks at office desktop screen in frustration. Photo by Shutterstock

No wonder we're being hit by Internet of Things botnets. Ever tried patching a Thing?

Internet of Things devices are starting to pose a real threat to security for the sensible part of the web, Akamai's chief security officer Andy Ellis has told The Register. Speaking in the aftermath of the large DDoS against security journalist Brian Krebs, Ellis elaborated a little on the makeup of the botnet which took down …
Gareth Corfield, 27 Sep 2016
Credit card theft

PCI Council wants upgradeable credit card readers ... next year

The Payment Card Industry Security Standards Council (PCI Council) has floated a new standard it hopes will reduce credit card fraud that starts at the point of sale, in part by allowing easier upgrades. The new version 5.0 of the PCI PIN Transaction Security (PTS) Point-of-Interaction (POI) Modular Security Requirements …
Simon Sharwood, 12 Sep 2016
Road at night image via Shutterstock

Network Management Systems are a 'treasure map' for hackers

Network Management Systems are far more easily attacked than previously reckoned, according to new research by Rapid7. The firm behind the popular Metasploit penetration testing tool warns that vulnerabilities in systems used to manage network elements (routers, servers, printers and more) offers attackers a “treasure map” of …
John Leyden, 07 Sep 2016

Suspicious DNS activity runs rife

Nearly half (40 per cent) of enterprise networks tested by security appliance firm Infoblox show evidence of DNS tunnelling. DNS tunnelling is symptomatic of active malware or ongoing data exfiltration within an organisation’s network. Infoblox’s latest quarterly security assessment report (pdf) also measured the prevalence of …
John Leyden, 01 Sep 2016
image by Leonardo Gonzalez http://www.shutterstock.com/gallery-650461p1.html

Hackers unleash smart Twitter phishing tool that snags two in three users

Black Hat Twitter scammers have a new weapon with the release of an effective spear phishing tool that lands a victim almost two thirds of the time, dwarfing the usual five-to-fifteen-per-cent-open-rate for spam tweets. The SNAP_R machine learning spear phishing Twitter bot is a data-driven menace unleashed at the Black Hat security …
Darren Pauli, 05 Aug 2016
Flag of Iceland

Iceland beats England again

Iceland is the best place on earth to locate a data centre, according to real estate outfit Cushman & Wakefield's most recent Data Centre Risk Index. The (reg-walled) index considers the cost of energy, international bandwidth, taxes, political stability and other factors to cook up a ranking for data centre hosts. Iceland …
Simon Sharwood, 03 Aug 2016
Image by KYTan http://www.shutterstock.com/gallery-1088876p1.html

Asian nations mull regional 'Europol' in fight against cybercrime

RSA APAC A closed-door meeting of cabinet ministers from more than a dozen countries met yesterday to mull the creation of a Europol-style organisation to crack down on cyber crime in the region and abroad, The Register has learned. The Asian organisation is conceptual only, but has support from countries including China, Malaysia, …
Darren Pauli, 21 Jul 2016

Chrome edges out IE for desktop browser crown

Google's Chrome displaced Internet Explorer as the top desktop browser by market share in April. This according to data from web monitors at Net Applications, which has Chrome narrowly edging out IE to win the top market share spot amongst desktop and notebook users. Net Applications lumps IE and Edge into the same figure. …
Shaun Nichols, 03 May 2016

US data suggests Windows 10 adoption in business is slowing

Windows 10's business push may be slowing, at least according to data gathered from visits to United States government web sites. Each month, The Register checks out StatCounter, Netmarketshare and the US government's analytics service to see how desktop operating systems are faring in the market. All count web traffic, the …
Simon Sharwood, 02 May 2016
Chernobyl

30 years on, Chernobyl wildlife still feeling effects of nuke plant catastrophe

Tuesday is the 30th anniversary of the disastrous failure of reactor number four in the Chernobyl Nuclear Power Plant – located in what is now the state of Ukraine – but the effects of the accident still linger. Chernobyl remains the biggest nuclear power failure in history, with radioactive material spread by winds over large …
Iain Thomson, 27 Apr 2016

Tech support becomes Australia's number one scam

New data from the Australian Bureau of Statistics (ABS) asserts that tech support scams have become the most prevalent way to defraud the nation's residents, 113,000 of whom responded to such scams over a year. The Bureau's data is derived from interviews conducted for its 2014-15 Multipurpose Household Survey, so the figure …
Simon Sharwood, 20 Apr 2016

Microsoft beefs up defences against Office macros menace

Microsoft has introduced a macros-blocking feature within Office 2016 in a move designed to collar a long-running malware threat. Macro-based malware is once again on the rise as a vector in the spread of various strains of malware including the Locky ransomware, BlackEnergy and the Dridex banking trojan. Microsoft’s stats …
John Leyden, 23 Mar 2016
Game of Thrones

She's coming... the Chief Data Officer

The chief data officer is on the rise. The number of CDOs appointed by major organisations rose from 400 in 2014 to 1,000 in 2015, according to Gartner. By 2019, 90 per cent will have a CDO, the analyst says. Their rapid emergence raises important questions about the role and position of the CDO in organisations. More …
Mark Samuels, 17 Mar 2016

Blah Blah blah ... I don't care! To hell with your tech marketing bull

Sysadmin blog Last week was the hardest time in recent memory for me. My best friend of over a decade, a feline companion by the name of Prometheus, has just passed away. While such a personal event might not seem relevant to things technological, it has served as something of a focusing effect for me. Trying to think through the haze of …
Trevor Pott, 07 Mar 2016
The methane mountains of Pluto's Cthulhu Regio Credits: NASA/JHUAPL/SwRI

Mountains of madness found on Pluto's Cthulhu Regio

New images from NASA's New Horizons Pluto probe suggest the used-to-be-a-planet possesses methane-frost-covered mountains. The image at the top of this story (or here for readers on mobile devices) shows Pluto (left) and in the insert depicts what NASA describes as “a mountain range located in southeast Cthulhu that’s 260 …
Simon Sharwood, 07 Mar 2016
Old beardy man thinking. Pic: Henadz via Flickr

Greybeard monobrow baldies rejoice! Boffins comb out hairy genes

University College London boffins have identified the genes that makes hair go grey, cause baldness and even induce the dreaded monobrow, think they can prevent all from happening. The research is outlined in a paper titled A genome-wide association scan in admixed Latin Americans identifies loci influencing facial and scalp …
Simon Sharwood, 03 Mar 2016
A 'connected' TV watches over its owner. Pic via shutterstock

Law enforcement's next privacy overreach will be the metadata of things

Governments around the world are legislating to collect metadata, usually with the excuse that modern crime-fighting and national security efforts require access to records of citizens' communications. In many nations that's sparked what I call "horizontal" scope-creep, in which, as just one example, the Australian Health …
Penguins, image via Shuttertock

Canonical reckons Android phone-makers will switch to Ubuntu

Canonical is courting Google’s Android partners in the hope they'll break ranks with the Chocolate Factory and deliver devices powered by Ubuntu. The Linux shop has received commitments from Android smartphone and tablet makers to ship devices using its Linux with devices “later this year.” Chief executive Jane Silber told …
Gavin Clarke, 09 Feb 2016

Chicago cops under fire for astonishingly high dashcam, mic failures

Analysis More than one in ten dashboard cameras and 80 per cent of microphones don't work on any given day, according to a review of the Chicago Police's recording equipment. The incredibly high failure rate has led to some pointed questions, and added to a general sense of distrust of officers in The Second City. It follows the …
Kieren McCarthy, 21 Dec 2015
Windows Logo

Windows 10 market share growth rate flattens again

Windows 10's market share growth slowed in November, according to the two tracking outfits The Register has tracked for the last couple of years. But a new source of desktop OS share data has Redmond's latest doing rather better. The oldies – Netmarketshare and StatCounter Global Stats – first. Netmarketshare has Windows 10 …
Simon Sharwood, 02 Dec 2015

Roundworm infection increases female fertility

Scientists have – slightly improbably – discovered that infection by the roundworm Ascaris lumbricoides increases fertility in women belonging to Bolivia's Tsimane ethnic group. In their abstract, published in Science, the researchers explain that they studied "nine years of longitudinal data from 986 Bolivian forager- …
Lester Haines, 20 Nov 2015
dunce_cap_648

Kids' tech skills go backwards thanks to tablets and smartmobes

The growing prevalence of smartphones and tablets in homes and schools may be retarding kids' development of IT skills, according to an Australian study. The research in question was conducted by Australia's National Assessment Program (NAP_, a body that undertakes research of students' skills. Every three years, NAP assesses …
Simon Sharwood, 19 Nov 2015
Senses by https://www.flickr.com/photos/kk/ cc 2.0 attribution sharealike https://creativecommons.org/licenses/by-sa/2.0/

Obscure Chinese web servers at the end of your connections? It's legit, and growing

Netcraft has issued an update to its regular rating of the world's most-used web servers and found two Chinese nginx forks on the rise. The usual suspects top the charts: Apache's out in front with 86,528,264 active sites, a 49.99 per cent market share. nginx's 27,855,455 users give it 16.09 per cent share. Microsoft and …
Simon Sharwood, 19 Nov 2015

Rip up secretive patent royalty deals, says new tech'n'biz coalition

Did you know that about $60 of the cost of a $400 smartphone goes to holders of something called "standards-essential patents" (SEPs)? And, when you consider that up to 250,000 patents could affect smartphones, you can see why there are such rich pickings for patent trolls ... more politely known as non-practicing entities. …
Drew Cullen, 17 Nov 2015
Blackhat

'Traditional' forms of thuggery decline in UK, cybercrime on the rise

The Office for National Statistics (ONS) has released information suggesting cybercrime incidents are growing more prevalent in British society than traditional criminal incidents, and has noted that this may be due to more criminal enterprises transitioning to the digital world. Included for the first time among the ONS's …
NBN Logo

Australia’s opposition promises more fibre in national broadband diet

Australia's shadow communications minister Jason Clare has promised to deploy more fibre-to-the-premises (FTTP) connections on Australia's national broadband network (NBN) should the opposition Labor party (ALP) of which he is a member win the nation's next election. Clare hasn't revealed just how the ALP will re-introduce …
Simon Sharwood, 14 Oct 2015
Non-sleeper

Boffins tell sleep-talking Android apps to SHUT UP

Too many Android apps are battery hogs when the screen is off, so researchers at Purdue University have released to a tool to shut them up. As the university explains here, badly-behaved apps can drain nearly 30 per cent of an Android phone's charge when the user thinks it's sleeping. “Out of the 45.9 per cent of daily …
Gold Hat stinking badges

Linux Foundation wants open source projects to show you their steenking badges

LinuxCon 2015 The Linux Foundation says it plans to introduce a new, voluntary badge program designed to help IT admins identify open source projects that have made security a priority. The new effort is part of the Foundation's Core Infrastructure Initiative (CII), which aims to fund and support open source projects that are critical to …
Neil McAllister, 19 Aug 2015
Interactive Office - And pigs might fly... by https://www.flickr.com/photos/oddsock/ CC 2.0 attribution https://creativecommons.org/licenses/by/2.0/ small crop at top of image

Windows 10 climbs to 3.55 per cent market share, Win 8.1 dips

Windows 10 looks to be doing alright, according to measurements taken by StatCounter. We usually consider desktop OS market share data from StatCounter and Netmarketshare in the first week of each month, but the former analyst also offers weekly data. With the debut of Windows 10 just 11 days behind us, a look at weekly data …
Simon Sharwood, 09 Aug 2015

Major web template flaw lets miscreants break out of sandboxes

Black Hat 2015 A serious fresh category of web security vulnerability creates the potential for all sorts of mischief, security researchers warn. Template engines are widely used by web applications in order to present dynamic data via web pages and emails. The technology offers a server-side sandbox. The commonplace practice of allowing …
John Leyden, 05 Aug 2015
Monster virtual machine

Magic quadrant of four squares, who's the virtualisation Mayor?

The analyo-mages at Gartner have emitted their Magic Quadrant for x86 Server Virtualization Infrastructure for 2015 and found a race in two between Microsoft and VMware, the only companies rated “leaders” in the field. The latter company's retained the prize position at top right in the Quadrant despite Gartner's mages not …
Simon Sharwood, 20 Jul 2015
Android icon desktop toys

Blurred lines, as consumer tech swallows delivery of BIG IT

A decade of “consumerisation” of IT has, according to Gartner, succeeded in shifting the balance of power within organisations — across departments and from hierarchies to individuals. For IT companies traditionally dominating the B2C market, the opportunities to target the enterprise space looms large. Already consumer tech …
Rachel Willcox, 24 Jun 2015

Germany says no steamy ebooks until die Kinder have gone to bed

A regulator in Germany says websites must only offer downloads of sexually explicit ebooks between 10pm and 6am. Essentially, the Youth Protection Authority in Bavaria says 2002-era rules that protect kids from blue movies on TV also cover digital books, publishing trade mag Boersenblatt reports. Telly stations in Germany can …
Shaun Nichols, 23 Jun 2015

Chips can kill: Official

The European Food Safety Authority (EFSA) has grimly concluded that those tucking into fried potato products run an increased risk of damaged DNA and developing cancer. The culprit is the chemical acrylamide (AA), which "naturally forms in starchy food products during every-day high-temperature cooking (frying, baking, …
Lester Haines, 08 Jun 2015
Internet of Things

When THINGS attack! Defending data centres from IoT device-krieg

When good fridges turn bad. It may sound like science fiction, but security experts are warning that the growing prevalence of interconnected “thingbots” is opening up businesses to all sorts of bother. Security-as-a-Service provider Proofpoint warned recently that more than 750,000 Phishing and SPAM Emails had been launched …
Rachel Willcox, 27 Apr 2015
Good riddance to bad Java

NINETY PER CENT of Java black hats migrate to footling Flash

RSA 2015 Almost every Java-hacking black hat is now popping Adobe Flash, after Microsoft's hard-line patch policy made it harder to target software such as Java. The stricken scum now face a choice: work harder to find Java zero-days or abandon ship and start exploiting old Flash bugs. Redmond's security brains trust – Tim Rains, Matt …
Darren Pauli, 27 Apr 2015
Hack the planet

Verizon to world: STOP opening dodgy phishing emails, FOOLS

Phishing and web app security problems remain the most common way for hackers to gain access to sensitive information, according to US telco giant Verizon. Two out of three breaches were the result of weak or swiped passwords, making a case for strong two-factor authentication, the latest edition of Verizon’s annual Data Breach …
John Leyden, 14 Apr 2015

Bored with Blighty? Relocation lessons for the data centre jetset

Building a data centre in the UK is a difficult business: the land’s expensive, planning permission is tough and the operating costs are high, particularly where power is concerned. As an epicentre of business and commerce, London is the obvious choice – it hosts the country’s major internet transit hub to boot – but it scores …
Tom Baines, 08 Apr 2015
Presidetn Obama signs the Unlocking Consumer Choice and Wireless Competition Act

Barry Obama declares national emergency over foreign hackers

US President Barack Obama has signed a new executive order authorizing economic sanctions against overseas individuals who are believed to have participated in online attacks or espionage. The order declares the prevalence of foreign-launched internet attacks a "national emergency" and cites the International Emergency …
Neil McAllister, 01 Apr 2015
Hitler as Fanboi

Apple is like HITLER says Chinese billionaire

One of the ways Chinese kids like to pass their time is watching video on a site called Leshi TV that's sufficiently popular the company's CEO Jia Yueting is ranked among the planet's billionaires. Jia is also an enthusiastic user of Weibo, China's Twitter equivalent. And late last week he used it to post the image above …
Simon Sharwood, 30 Mar 2015
chart

PEAK WINDOWS 7 may well be behind us

Windows 7's market share appears to have peaked, according to two sources we use to assess what's running on the world's desktop computers. Those sources are Netmarketshare and Statcounter.com, two outfits that make their assessments of operating system prevalence based on traffic hitting web servers. That's an imperfect …
Simon Sharwood, 01 Feb 2015

Windows XP beats 8.1 in December market share stats

Windows 7 remains the planet's dominant desktop operating system, but Windows XP again claimed second place during December 2014 according to data from Statcounter.com and Netmarketshare. We've tracked the two firms' data for a year now and both have produced some odd dips and surges, reflecting their imperfect methods of …
Simon Sharwood, 08 Jan 2015
Netgear ReadyNAS 314 (RN31400) 4-bay NAS box

Trevor contemplates Consumer Netgear gear. BUT does it pass the cat hair test?

Sysadmin blog Is consumer networking gear really crap? As technologists, we tend to have a chip on our shoulder about it because it can't do all the things the latest, greatest enterprise stuff can do, but does that really matter? The capabilities of consumer gear have been steadily increasing, and perhaps some of our ire is unwarranted. …
Trevor Pott, 30 Nov 2014
P3 uses dedicated hardware

Yes, UK. REST OF EUROPE has better mobe services than you

UK readers, what you've always suspected has been proven true – even the weakest mobile networks abroad perform better than some of our best. This is according to German mobile network survey company P3, which this week published solid numbers on mobile network coverage. P3 uses dedicated hardware P3's test equipment And …
Simon Rockman, 26 Nov 2014
Smartphones

Managing BYOD starts with asset management

The prevalence of BYOD (bring your own device) activity across the enterprise landscape has seen every IT vendor worth its salt try to offer a solution to the problem of keeping employees' mobile devices under control. There are several worthy options, such as CYOD (choose your own device) and managed virtualised desktop …