Articles about Recipient

NBN truck on Mount Cotton

nbn™ switches on first Telstra HFC-powered broadband services

nbn™, the entity building and operating Australia's national broadband network (NBN), has announced its first services delivered over the hybrid fibre-coax (HFC) cables formerly owned by Australia's dominant carrier Telstra. Ocean Reef, a suburb of the Western Australian capital Perth is the lucky recipient of the new service …
Simon Sharwood, 28 Jul 2016

Church organist nabbed for playing glory hole in excelsis

A church organist is due before the beak next month after he allegedly thrust his pink pipe through a glory hole in excelsis and “waited” for someone to make sweet music. 74-year-old Jerry Michael Childress is alleged to have entered the bog in a Brooksville, Florida-based park and, er, pulled out all the stops, a report by …
Paul Kunert, 27 Jul 2016

Ivory tower drops water bombs on dumpster fire

A veritable Who's Who of the tech industry have signed an open letter aggressively criticizing Donald Trump and his proposed presidential policies. "We are inventors, entrepreneurs, engineers, investors, researchers, and business leaders working in the technology sector," the letter begins. "We are proud that American …
Kieren McCarthy, 14 Jul 2016
EU egg timer, photo via Shutterstock

Brit Science Minister to probe Brexit bias against UK-based scientists

Jo Johnson, the Minister of State for Universities and Science, has announced that that he has set up an email account to receive evidence that UK scientists have been discriminated against after Brexit. A confidential survey of the UK’s Russell Group universities found cases where British researchers were being asked to give …
Katyanna Quach, 13 Jul 2016
Cheesy pic of man holding face in shame as accusatory finger emerges from display. Photo via Shutterstock

Trial to store benefits claimants' personal data on blockchain slammed

A government experiment to store the information of benefits claimants using blockchain tech has been slammed by experts, who have warned it could expose highly sensitive personal data. London-based fintech company GovCoin Systems has partnered with Barclays, RWE npower and University College London to trial blockchain …
Kat Hall, 12 Jul 2016
Facebook Lite app

Facebook offers end-to-end encrypted chat – if you find the right setting

Facebook is rolling out end-to-end encryption for its messaging service to bring it in line with competitors, including its own WhatsApp. But as ever with Facebook, there's a catch: you'll have to actively select the encrypted version each time, and the service will be limited to a single device. You also won't be able to use …
Kieren McCarthy, 08 Jul 2016
drone

Post Brexit EU will spend 'stability and peace' budget funding Chinese war drones

The European Union wants to spend part of its “peace building” overseas aid budget on equipping African and Middle Eastern countries' armed forces, according to reports – which could include the provision of Chinese-built drones. The Financial Times reported yesterday that Brussels bureaucrats are planning to amend the rules …
Gareth Corfield, 05 Jul 2016
Digital feet, photo via Shutterstock

Body of evidence: Biometrics and YOU

The proliferation of password protection has become an assault on the senses. The rise of biometric authentication is helping to create some balance, enabling verification with a simple interaction, which, for many, is the fingerprint reader on a mobile phone. And once you start using the fingerprint/phone combo for NFC payments …
Bob Dormon, 29 Jun 2016

Dyfed-Powys Police fined for publicising pervs' particulars

Dyfed-Powys Police in Wales, UK, sent confidential information that could identify convicted sex offenders to a member of the public by accident. Although the leak was minor, Brit watchdog the ICO fined the force £150,000 as it indicated sloppy internal processes. An officer sent an email chain containing the names and …
Team Register, 08 Jun 2016
Facebook VR, photo by Facebook

Facebook to kill native chat, bring opt-in crypto to Messenger

Facebook will shutter its native message facility, forcing users to install the Messenger client which will sport opt-in end-to-end encryption. The change brings the ad-slinger inline with Google's Allo chat service, which will activate its privacy conscious mode only if users flick a switch. That decision won brought …
Darren Pauli, 03 Jun 2016
Error

Trouble originating between chair and keyboard caused most UK breaches

UK data breaches caused by good old human error rose again early this year, accounting for 62 per cent of all data breaches reported to UK data protection watchdogs in the first quarter of 2016. This far outstrips other causes of breaches, such as insecure webpages and hacking, which stands at nine per cent combined. The …
John Leyden, 02 Jun 2016
Extortion

Miscreants demand Bitcoins to stay silent on 'dirty secrets' of Tumblr, LinkedIn hack victims

The FBI has issued an unusual warning about a new breed of scammers looking to get rich off the back of recent high-profile data breaches. According to the agency's Internet Crime Complaint Center (IC3), a large volume of emails are being reported where the sender claims to have used data from recent breaches at LinkedIn, …
Iain Thomson, 01 Jun 2016
Snail photo Jurgen Schoner CC wikimedia

Switkowski wades into NBN leak debate, ALP is furious

nbnTMchair Ziggy Switkowski has penned an article for Fairfax saying the “NBN leakers” aren't whistleblowers, but partisan ideologues. The article, coming as it did during an election campaign, has drawn immediate fire from the ALP's Tony Burke, who accuses Switkowski of breaching the “caretaker conventions”. With the …
Google Home

Google slaps Siri with Assistant and Amazon with Home device

Google I/O 2016 Google is getting into the digital helper game with the launch of Assistant, a Siri-style online helper, and promised Google Home – an Echo-like listening station that can be used to house the helper. CEO Sundar Pichai explained that Assistant was the result of ten years of language processing by the Chocolate Factory. Over …
Iain Thomson, 18 May 2016
Peter Capaldi as Dr Who. Credit: BBC

At the BBC, Agile means 'making it up as we go along'

A £75m “Agile” BBC IT project has evaded scrutiny because managers could make up the benefits as they went along, according to the spending watchdog the National Audit Office. Any likelihood of the project achieving savings is now officially rated as “in doubt” by the BBC’s own project monitoring. Since the costly failure of …
Andrew Orlowski, 10 May 2016
Google UK reception

Google warns of breach

Google is alerting employees that some of their personal data has been exposed. The Mountain View advertising house sent letters (PDF) to some of its workers stating that someone with its employee benefits provider mistakenly sent a file to a colleague containing the names and social security numbers of Google employees. "We …
Shaun Nichols, 10 May 2016
Silhouette of spy discerning password from code uses a command on graphic user interface

SS7 spookery on the cheap allows hackers to impersonate mobile chat subscribers

Flaws in the mobile signalling protocols can be abused to read messaging apps such as WhatsApp and Telegram. Security researchers at Positive Technologies found they can intercept messages and respond as if they were the intended recipient in services such as WhatsApp or Telegram. This is not a man in the middle attack: …
John Leyden, 10 May 2016

Google-backed Yieldify has acquired IP from ‘world’s biggest patent troll’

Yieldify, the Google Ventures-backed startup accused of stealing code from British adtech company Bounce Exchange, has been making some unusual friends. Yieldify has acquired an ancient web patent from III Holdings which was first filed in 2007. III Holdings is better known as Inside Intellectual Ventures, co-founded by Nathan …
Andrew Orlowski, 06 May 2016

Iranian cyberspy phishing rod pulled from the waters and exposed

Security researchers have lifted the lid on a decade long cyber-espionage campaign. The Infy malware, which originated in Iran, has been used to target businesses and governments across the world since 2007 and remains in use, according to security researchers from Palo Alto's Unit42 research unit. Over the time, the malware …
John Leyden, 03 May 2016
microsoft_clippy_648

Microsoft wants devs to take notes on their families

Microsoft has GitHubbed a framework that could finally make an Internet-connected refrigerator useful: an application for family members to leave notes for each other. Well, actually FamilyNotes is a developer demonstrator with two aims: to give developers more examples of putting code together in the Universal Windows …
Melted chocolate clock by Emily McCracken, CC2.0 license

Time for a patch: six vulns fixed in NTP daemon

Cisco has turned over a bunch of Network Time Protocol daemon (ntpd) vulnerabilities to the Linux Foundation's Core Infrastructure Initiative. The vulnerabilities, discovered during its ongoing ntpd evaluation, “allow attackers to craft UDP packets to either cause a denial of service condition or to prevent the correct time …
Angry man yelling on phone while reading vintage printer paper report. Photo by SHutterstock

What a difference a year makes: ICO tele-spam fines break £2m barrier

The Information Commissioner's Office (ICO) has issued £2m in fines since a change in the law allowing it to crack down on nuisance marketing, an increase of more than 565 per cent on the preceding 12 months. As the law stands, companies intending to make marketing phone calls without prior permission must first check the …
dunce_cap_648

Stop using USB sticks to move kids' data, auditor tells Education Dept

The Department for Education (DfE) needs to improve the way it handles the personal sensitive information of 20 million records contained in its National Pupil Database, according to the Government Internal Audit Agency (GIAA). The findings were revealed in the department's annual accounts for 2014/15, which were published …
Kat Hall, 22 Apr 2016

12,000 chopped: Intel finds its inner paranoid

Only the Paranoid Survive, or so former Intel chief executive Andy Grove once wrote. And it seems that, faced with the demise of the PC market, Intel CEO Brian Krzanich has found his inner Andy Grove. Grove, who died last month aged 79, left both an awesome business record and some great quotes behind him. While Intel co- …
Embarrassed/exhausted man sits in front of laptop in hipstery office. Photo by Shutterstock

Admin fishes dirty office chat from mistyped-email bin and then ...?

ON-CALL+POLL Welcome again to On-Call, our weekly (and preponderantly prurient) piece in which readers share horror stories from their workplaces. This week, we're going interactive, because the situation in which reader “Flash” found himself describes an ethical dilemma The Reg feels un-qualified to address. Flash once had a gig “ …
Simon Sharwood, 15 Apr 2016
Live news illustration with microphones and cameras

Google kit-cooker bails

Facebook has poached ex-Googler Regina Dugan to lead its hardware research. The global ad-farmer has shown an interest in a range of different hardware segments over the years: servers and switches for its data centres, various rumoured smartphone projects, and its purchase of Oculus Rift, to name a few. At Google, as USA …
The two Wicked Lasers fired up

Turbo-charged quantum crypto? You'll need Cambridge laser boffins for that

Boffins hope to turbo-charge the speed of “unbreakable” quantum cryptographic systems with a new technique involving “seeding” one laser beam inside another. Researchers from the University of Cambridge and Toshiba Research Europe have used the technique to demonstrate that it might be possible to distribute encryption keys at …
John Leyden, 06 Apr 2016
10 image via Shutterstock

We bet your firm doesn't stick to half of these 10 top IT admin tips

IT is perceived in mixed ways by users. Some look on the amazing stuff it does and think there must be witchcraft going on in there somewhere. Others think that because they configured their Wi-Fi printer and Sky box at home, they're a genius of computing. If you're to preserve order, security and governance in the use of your …
Dave Cartwright, 06 Apr 2016
reddit wanted poster by Russia's telecommunications regulator Roskomnadzor

Reddit's warrant canary shuffles off this mortal coil

It appears that Reddit has been the recipient of a National Security Letter, after the warrant canary it has published in its annual transparency reports has disappeared. A warrant canary is a technique whereby companies can get around the restrictions involved with National Security Letters, which typically bar the recipient …
Iain Thomson, 31 Mar 2016

OK, so the users want corporate apps on the move. Don't Panic

People want to be able to do their job from wherever they happen to be. It's understandable – if you don't need to be in an office chained to your desk then why not work somewhere more convenient? Let's look at five ways to make this achievable. Remote access to local apps At the most basic level you have the traditional …
Dave Cartwright, 30 Mar 2016

IETF group proposes better SMTP hardening to secure email. At last

Simple Mail Transfer Protocol (SMTP), that staple of e-mail communications, was born in an era when nobody thought the Internet needed security. While extensions have been written since to fix this – the most important is STARTTLS – there remains a problem: STARTTLS doesn't yet guarantee either message confidentiality or proof …
Woman angrily hangs up phone. Photo via Shutterstock

Web ads are reading my keystrokes and I can’t even spel propperlie

Something for the Weekend, Sir? A friend has the willies. He even went on Facebook to tell us about his willies. He’s not normally the kind to get the willies, but willies is what he has. American readers of this column may be disappointed to learn that my friend is neither a fellow of loose morals nor is he, as far as I am aware, multitudinally …
Alistair Dabbs, 18 Mar 2016
Bank vault

A typo stopped hackers siphoning nearly $1bn out of Bangladesh

Cybercrooks looted more than $80m from Bangladesh’s central bank in one of the largest known bank robberies in history. Fraudsters used stolen credentials to make illegitimate cash transfers from the Bangladesh government’s reserve account at the Federal Reserve Bank of New York. The damage could have been even worse. If …
John Leyden, 11 Mar 2016
Uncle Sam, photo via Shutterstock

How the FBI will lose its iPhone fight, thanks to 'West Coast Law'

Analysis Apple versus the FBI has generated much discussion and conjecture lately. The vast majority of it has centered on the rights and the wrongs, about the loss of privacy, and of the precedent that breaking one iPhone would create. Many are hanging on the blow-by-blow developments for an outcome, to see which side trumps: Apple …
Cat 5 cable

Phorm suspends its shares from trading amid funding scrabble

Controversial web monitoring business Phorm has temporarily suspended trading in its shares after failing to secure funds. In a statement to the London Stock Exchange yesterday, it said it is in "advanced discussions" regarding alternative financing. "There can be no guarantee that such discussions will result in any funds …
Kat Hall, 26 Feb 2016

Reluctant Wikipedia lifts lid on $2.5m internet search engine project

The Wikimedia Foundation has finally disclosed details of its controversial Knowledge Engine grant – and it confirms that Wikipedia is getting seriously into search, despite Jimmy Wales' categorical denial that WMF is “doing a Google”. Wikimedia’s reluctance to detail the restricted grant, from the Knight Foundation, was a …
Andrew Orlowski, 12 Feb 2016
Boy with a backpack hides his eyes and cries. Pic by Shutterstock

National Pupil Database engorged to 20 million individual kids' records

The UK Department for Eduction has enlarged its mega database containing sensitive personal pupil information to nearly 20 million individual records, according to a Freedom of Information response. The National Pupil Database contains a range of sensitive information dating from the year 2000, including name, postcode, …
Kat Hall, 12 Feb 2016
spies_648

Intelligence Committee marks Gov's Snoopers' Charter: See me after class

The Intelligence and Security Committee of Parliament has warned the Government that it needs to make "substantive amendments" to its draft Investigatory Powers Bill, before proceeding to outline changes which don't appear to be very "substantive" at all. The committee said the new draft provides insufficient safeguards and …

Head transplant candidate sells souvenirs to fund operation

A Russian man who has volunteered to undergo the world’s first head transplant has begun selling souvenirs to fund the op, after the world’s billionaires failed to pick up the tab. Valery Spiridonov, a 31 year old computer scientist who suffers from a rare degenerative wasting disease, is set to be the world’s first head …
Joe Fay, 05 Feb 2016
Home Secretary Theresa May introduces draft Investigatory Powers Bill to MPs. Pic credit: Parliament TV

Home Office lost its workers' completed security vetting forms

The Home Office has admitted to The Register that among its data breach incidents last year was one in which security vetting documents disappeared from within secured government premises. Through the Freedom of Information Act, The Register has learned that the Home Office – responsible for the UK's domestic counter- …
parcels_shutterstock_648

Google patents robotic 'mobile delivery receptacle'

Google has been granted a patent for a "mobile delivery receptacle" - a vehicle designed to accept airborne drone deliveries and take them to a "secure location, such as into a garage" at the recipient's address. The patent blurb explains: "Unmanned, aerial delivery services may be problematic for delivery to users. For …
Lester Haines, 27 Jan 2016
Chick egg, photo via Shutterstock

From DNA to Twitter: Data's digital journey to commodity

Big Data and All That In attempting any technological history, one of the traditional difficulties is to know where to begin. This difficulty follows from a flawed assumption that there is a story that is linear and began in one place at one time. The real world is not like that. Technology is more like a river that has its origins in any number of …
John Watkinson, 22 Jan 2016
Crop of doctor with pen and clipboard

Nearly 1 in 5 health data breaches take years to spot, says Verizon

Stolen medical information is a prevalent problem across multiple industries, according to a new study by Verizon. The issue is compounded because many organisations outside of the healthcare sector do not even realise they even hold this type of data. Common sources of protected health information are employee records ( …
John Leyden, 16 Dec 2015

FireEye flamed: A single email will grant total network access

Researchers at the Google's Project Zero security research team have found a brutal hole in FireEye kit that allows attackers to lay waste to corporate networks with a single email. The flaw, dubbed "666" from its Project Zero vulnerability number, is a passive monitoring hole that respected hacker Tavis Ormandy describes as a …
Darren Pauli, 16 Dec 2015
Man in an orange jumpsuit clutches prison bars. Image by Shutterstock

Commentard achieves bronze badge, goes directly to jail

Those of you who've been knocking around the El Reg forums for a while will know that we have a badge system designed to honour invaluable commentard contributions to the site, or at least acknowledge a certain degree of commitment to giving forth. To get a foot on the first step on the ladder of glory - the bronze badge - you …
Lester Haines, 17 Nov 2015

Samsung S6 calls open to man-in-the-middle base station snooping

PacSec Modern Samsung devices including the S6, S6 Edge and Note 4 can have phone calls intercepted using malicious base stations, according to initial research findings from two researchers. Daniel Komaromy and Nico Golde demonstrated the attacks on Samsung's 'Shannon' line of baseband chips today at the Mobile Pwn2Own competition …
Darren Pauli, 12 Nov 2015

Touchnote breach: Wrote a postcard with us? Thieves have your pal's name, address

London-based postcard biz Touchnote has offered more details about a data breach it confessed to on Bonfire Night. In a statement published on its site on 5 November, Touchnote claimed it had the previous day "received information confirming that Touchnote has been victim of criminal activity, resulting in the theft of some of …
Broken CD with wrench

E-mail crypto is as usable as it ever was, say boffins

The main reason the world is able to read and enjoy the contents of Hillary Clinton's emails is that crypto tools aren't any better than back when Phil Zimmerman created PGP, the crypto system even he can't use. That's the conclusion of this study into e-mail crypto usability, a follow-up to a study which reached the same …
Boats storm girl photo via Nikolina Mrakovic Shutterstock.com

Don't panic, biz bods: A guide to data in the post-Safe Harbor world

The Safe Harbor agreement this week suddenly became of interest to a lot more IT managers than had previously given a stuff about it. But what is Safe Harbor, exactly? The Safe Harbor agreement between the US and the EEA - which comprises the member states of the EU plus Iceland, Norway and Liechtenstein – dating from 2000, …
Dave Cartwright, 09 Oct 2015
Singapore Post test drone

Singapore Post tests drone delivery services

Video Singapore's postal service has trialled delivery-by-drone. In an arrangement that will come as no surprise to observers of the tightly-governed city state, the effort was a joint venture between Singapore Post and the nation's Infocomm Development Authority (IDA). The pair used the Pixhawk Steadidrone drone to send a letter …
Simon Sharwood, 09 Oct 2015