Articles about Secure Computing

Patch this braXen bug: Hypervisor hole lets guest VMs hijack hosts

The Xen hypervisor project today released nine security patches that should be applied ASAP – particularly the one that stops guest virtual machines seizing control of host servers. That vulnerability – XSA-148 – can be exploited by a paravirtualized guest to manipulate the memory layout of the underlying system, and …
Chris Williams, 29 Oct 2015

Intel infosec folk TEE off open source app dev framework

A trio of Intel boffins have broken a vendor lock-down on trusted execution environments (TEEs) with the release of an open source framework that could help developers to build more secure apps. Intel wonks Brian McGillion, Tanel Dettenborn, and Thomas Nyman (plus N. Asokan of Aalto University and University of Helsinki) …
Darren Pauli, 30 Jun 2015
ATLAS (A Toroidal LHC Apparatus) is one of six detector experiments at the Large Hadron Collider (LHC) – image by Maximilien Brice CERN/Science photo library

Cisco spins CERN partnership

Cisco is joining CERN’s openlab, in a partnership The Borg says will help secure the huge computing infrastructure the LHC-operator needs to run. The vendor's participation will start with CERN and Cisco putting together a team to develop highly secure computing infrastructure technologies capable of dealing with massive amounts …
LG Chromebase

Wait, that's no moon 21.5-inch monitor, it's an all-in-one LG Chromebase PC

Chromebooks have been one of the few bright spots in an otherwise down PC market this year. Now LG is hoping that the success Google has had with its "browser in a box" laptops can carry over to the desktop, as well. Desktop PCs running Chrome OS have been available previously in the form of Chromeboxes, devices about the size …
Neil McAllister, 18 Dec 2013
Jeanette Horan

IBM CIO's Great Refresh: No, Sales Guy, you can't JUST use DropBox

CIO interview She might be CIO of IBM, but Jeanette Horan is just like you: replacing Windows XP with Windows 7, ripping out Internet Explorer 6 and floating a growing amount of software on the cloud. She also has to contend with staffers begging her for the ability to share information using third-party sync 'n' share apps like DropBox. …
Gavin Clarke, 02 Aug 2013
The Register breaking news

Ubuntu for smartphones aims to replace today's mobes, laptops

Canonical, the company behind the Ubuntu Linux operating system, has announced a new version of Ubuntu designed specifically for smartphones. Ubuntu for phones is based on the Linux kernel and uses the same Unity user interface that Canonical has developed for the desktop, which the company says should make it immediately …
Neil McAllister, 02 Jan 2013
The Register breaking news

Microsoft dumps Metro from Windows 8

Microsoft has dropped "Metro", the name given to the squaretastic user interface for Windows 8 and Windows Phone, claiming it was just a code name all along. Litigation, though, may be the real reason as it seems the word may be owned by a European company or individual that objected to its use. The change comes late in the day …
Gavin Clarke, 03 Aug 2012
The Register breaking news

Microsoft to pay $250,000 for hot new security defenses

Microsoft is offering more than $250,000 to researchers who develop new security defenses to protect Windows users against attacks that exploit software bugs. Microsoft's Blue Hat Prize announced on Wednesday at the Black Hat security conference will pay $200,000 for the best “novel runtime mitigation technology designed to …
Dan Goodin, 04 Aug 2011
cable

Intel pumps $100m into university research

Intel is launching a $100M, five-year program to juice university research in the US on advanced computing projects, an effort that will attempt to walk the fine line between pure research and marketable product development. "What makes this different from other industry efforts to engage the academic researcher is that we're …
Rik Myslewski, 26 Jan 2011
The Register breaking news

Intel needs to rethink security to profit from McAfee buy

Analysis Intel's surprise $7.76bn acquisition of McAfee is not only the biggest pure-play security deal in history, but the most significant statement of intent by an IT superpower since Microsoft launched its Trustworthy Computing initiative back in 2002. Microsoft launched the initiative to develop products that are more secure by …
John Leyden, 20 Aug 2010
The Register breaking news

IBM hands out malware-stuffed USB at security conference

IBM has apologised after supplying a malware-infected USB stick to delegates of this week's IBM AusCERT security conference. The unlovely gift was supplied to an unknown number of delegates to the Gold Coast, Queensland conference who visited IBM's booth. Big Blue does not identify the strain of malware involved in the attack …
John Leyden, 21 May 2010
The Register breaking news

DoH tells NHS to dump IE6

The Department of Health has told trusts using Windows 2000 or XP to move to version 7 of Microsoft's browser. In a technology bulletin published by the department's informatics directorate on 29 January 2010, it advised NHS trusts using Microsoft Internet Explorer 6 on either Windows 2000 or Windows XP to move to version 7 of …
Kable, 01 Feb 2010
graph up

McAfee sales strong despite recession

McAfee bucked the trend of poor financial news from the IT industry by posting strong results that exceeded analyst expectations on Thursday. The security software firm's Q4 revenues came in at $424m, an increase of 19 per cent compared to the $356m recorded in Q42007. Q42008 profits hit $45.4m, up from $12.2m in the same period …
John Leyden, 13 Feb 2009
The Register breaking news

Microsoft's 'M' treads on US veterans' toes

Microsoft is in hot water again for again taking the name of someone else's software for one of its fledgling products It's emerged Microsoft's M programming language shares the same name as a 30-year-old open language used by the US Department of Veteran Affairs (VA) along with tens of thousands of users in medicine and …
Gavin Clarke, 05 Nov 2008
The Register breaking news

McCain pulls ahead in pharmaceutical spam

USA '08 Barack Obama is ahead not only in the polls but where it counts the most - in spam messages. However, his presidential rival John McCain can claim his own guaranteed enlarged small victory. The Democrat candidate is the topic of 70 per cent more junk mail messages than his Republican counterpart overall. But McCain edges ahead …
John Leyden, 04 Nov 2008
The Register breaking news

Phishers adapt old scams to exploit bank turmoil

Scammers are exploiting meltdown in the banking sector in an attempt to trick users into handing over sensitive financial information. Phishing emails commonly pose as security checks from a prospective mark's bank. The latest generation of the scam imitates communiques about bank mergers. US consumer watchdog the Federal Trade …
John Leyden, 12 Oct 2008
hands waving dollar bills in the air

McAfee snaps up Secure Computing

McAfee is buying smaller IT security rival Secure Computing for $465m in cash. Secure Computing is best known for its firewall and security appliances product lines but more recently it has been busy on the acquisition front, most recently with a deal to buy user control firm Securify for $20m earlier this month. Prior to that …
John Leyden, 22 Sep 2008
The Register breaking news

Secure Computing snaps up user control firm Securify

Security appliance firm Secure Computing has bought user access monitoring and control firm Securify, in a deal valued at up to $20m ($15m guaranteed in cash and stock, plus an earn-out of up to $5m). Securify's appliance-based technology allows organisations to control and keep tabs on user access to applications. The …
John Leyden, 04 Sep 2008
Pacman

MessageLabs takes smut-blocking tech in-house

Web security services outfit MessageLabs has acquired image analysis technology firm Fortium ICA Limited. Fortium Technologies, the parent company of Fortium ICA, will continue to market and develop video copy control and fingerprint detection technologies as an independent company. Terms of the technology acquisition deal, …
John Leyden, 26 Aug 2008
The Register breaking news

The rise of the Malware Mafia

RSA Policy makers should reject pressure to draft new laws targeting phishing and other types of cyber crime because existing statutes already cover most of the illegal activity, a researcher who investigates online criminals said. Although phishing, malware attacks, and botnet propagation have all come about in the last decade or …
Dan Goodin, 11 Apr 2008
globalisation

Russian FSB 'protecting' Storm Worm gang

The creators of the Storm Worm botnet are known to US authorities but a lack of co-operation from their counterparts in St. Petersburg, Russia, is preventing action being taken. St. Petersburg was the centre of the infamous Russian Business Network. It's also reckoned by some to be the city the Storm Worm (more properly Trojan) …
John Leyden, 31 Jan 2008
Flag Russia

Storm Worm turns one

Thursday marked the first anniversary of the infamous Storm Worm. Created by a Russian-based criminal network, the malware rapidly infected millions of PCs in Europe and North America and continues to be a problem. The Storm Worm malware (more properly known as a Trojan) strain first surfaced on 17 January 2007, in emails …
John Leyden, 18 Jan 2008
homeless man with sign

Scepticism over cyber-jihad rumours

Islamist hackers are reportedly making preparations to launch a cyber-jihad against Israeli and Western websites beginning on 11 November. Experts are split over whether to take the attacks seriously or not. Rumours of the putative attack first surfaced in Israeli intelligence magazine DEBKAfile earlier this week. It reported …
John Leyden, 02 Nov 2007
Adobe

Malware spectre haunts Adobe Reader

Adobe Reader may be subject to a security hole that creates a means for hackers to take over vulnerable Windows boxes simply by opening a maliciously constructed PDF document. Gray hat hacker Petko Petkov, who first discovered the bug, omits details of the supposed flaw. He said security concerns over the potency of the flaw …
John Leyden, 21 Sep 2007
Windows Vista teaser

ATI driver flaw exposes Vista kernel

An unpatched flaw in drivers from ATI creates a means to smuggle malware past improved security defences in the latest version of Windows and into the Vista kernel. Microsoft is working with ATI on an update which security watchers warn might be far from straightforward to roll-out. The existence of the security flaw in ATI's …
John Leyden, 10 Aug 2007

Speeding up the net - is it possible?

The best way to get reliable performance out of a wide area network (WAN) is to install your own high-speed gigabit fibre optic cables between all the locations in your organisation. This could provide seemingly unlimited bandwidth for your employees to use the applications they like and not have to think twice about the volume …
Bob Tarzey, 20 Jul 2007
channel

Fast flux foils botnet takedown

Network security analyst Lawrence Baldwin has helped take down his share of bot nets, but he worries that those days may largely be over. Traditional bot nets have used Internet relay chat (IRC) servers to control each of the compromised PCs, or bots, but the central IRC server is also a weakness, giving defenders a single …
Robert Lemos, 11 Jul 2007
The Register breaking news

YouTube 'riddled with 40-plus security vulnerabilities'

Google researchers have at last responded to a hacker who says he's uncovered more than 40 YouTube flaws that put users at risk. Christian Matthies, says he's been trying to get the attention of Google bug squashers for the past several months, but was unsuccessful in getting a single reply to his emails warning of the …
Dan Goodin, 20 Jun 2007
The Register breaking news

Is that YouTube clip you just watched booby trapped?

Video clips from YouTube might come booby-trapped with malware, security watchers warn. A fake video file containing the Zlob Trojan has been planted on the video-sharing site. If selected, the Trojan bombards infected users with ads. It might also be used to upload other forms of malware onto compromised PCs. According to the …
John Leyden, 20 Jun 2007

Vista and IE 7 to receive 'critical' fixes on Patch Tuesday

Microsoft is to issue four critical security fixes for this month's Patch Tuesday. Three of these affect either Windows Vista or Internet Explorer 7, which the software maker holds out as a paragon of its conversion to secure computing. In all, Microsoft will push six high-priority updates this Tuesday, the company announced …
Dan Goodin, 07 Jun 2007
The Register breaking news

Air of desperation encircles SIM Summit

The SIM industry has been gathering around Prague for Informa's annual SIM Summit, with various luminaries from the industry presenting their plans for how the SIM is going to develop over the next few years - and the answer seems to be away from mobile phones, if anywhere at all. The Subscriber Identity Module (SIM), used in …
Bill Ray, 25 Apr 2007
arrow pointing up

Pentagon hacker appeals US extradition

Gary McKinnon, the Pentagon hacker, faces what might be his last appeal hearing against extradition on 13 February next year at London's Court of Appeal. McKinnon, 40, faces possible trial under US anti-terror laws over alleged attacks on military and NASA systems between 2001 and 2002. The Scot lost his first appeal against …
John Leyden, 12 Dec 2006
For Sale sign detail

Bogus anti-spyware firm fined $1m

A firm accused of marketing bogus anti-spyware software has paid $1m to settle a lawsuit brought by the US State of Washington. New York-based Secure Computer (not to be confused with legitimate security firm Secure Computing) is accused of using spamming and pop-ups in an aggressive and allegedly deceitful marketing campaign …
John Leyden, 05 Dec 2006

SanDisk to secure online sales with USB Flash drives

SanDisk will next year bring secure computing to its USB Flash drives in a bid to persuade online banks, auction houses and retailers to use them to minimise unauthorised and fraudulent transactions. The technology is called TrustedSignins and essentially embeds a "high performance" encryption engine into the Flash drive. …
Tony Smith, 24 Oct 2006
hands waving dollar bills in the air

Share the Vista vision, Microsoft tells security rivals

Microsoft has called on security software firms to provide more than just "basic" products for Windows Vista. Partners must deliver more than "baseline" protection and support for Windows Vista's new security architecture to address future threats to computers, it says. Its cry comes in response to a barrage of complaints from …
Gavin Clarke, 03 Oct 2006
fingers pointing at man

BlackBerry hacking peril exposed

A hacking program, due to be released next week, will demonstrate how to use a connection from BlackBerry devices to potentially bypass enterprise security defences. Jesse D'Aguanno, director of security research at German firm Praetorian Global, gave a presentation on how to use the BlackBerry environment to circumvent …
John Leyden, 10 Aug 2006
The Register breaking news

The IT manager's guide to social computing

Analysis If your company is averse to openness and transparency and is unlikely to change, then this article is not going to interest you much. Unless, of course, you are considering a change of direction. The fact is that 'social computing' cannot be implemented without trust between employers and employed, between colleagues and …
David Tebbutt, 21 Jul 2006
channel

Secure Computing buys CipherTrust

Secure Computing has announced a deal to acquire CipherTrust, the messaging security firm, for $273.6m in cash and stock. The deal is expected to close in early September, subject to regulatory approval and customary closing conditions. The deal allows Secure Computing to add CipherTrust's messaging security appliances to its …
John Leyden, 12 Jul 2006
The Register breaking news

Researchers look to predict software flaws

Want to know how many flaws will be in the next version of a software product? Using historical data, researchers at Colorado State University are attempting to build models that predict the number of flaws in a particular operating system or application. In an analysis to be presented at a secure computing conference in …
Robert Lemos, 10 Jul 2006
The Register breaking news

Microsoft playing waiting game against Google

Microsoft will beat Google in the online advertising market through sheer tenacity during the next five years, not by offering a new or radically different online strategy, according to chief executive Steve Ballmer. Ballmer surveys the competition Ballmer, speaking at a Churchill Club lunch in Silicon Valley Thursday ( …
Gavin Clarke, 12 May 2006
The Register breaking news

As Emperor of Security, I hereby decree...

Comment Ever since I was a little kid, I've been interested in Roman history. It still amazes me when I think about ancient Rome: the most powerful empire the world had ever seen, bringing countless advances to far-flung nations, yet still barbaric in astonishing ways, finally brought low due to a wide variety of causes and plunging the …
Scott Granneman, 28 Mar 2006
The Register breaking news

This is how a government-filtered internet looks

There been alot of argument in Tunis during the World Summit over the fact that the government filters internet access to remove websites it doesn't like. We thought we'd show you what it looks like if you're on the end of it. As such, here is a screengrab of the Swissinfo.org site as seen from the Tunisian perspective. It is a …
Kieren McCarthy, 21 Nov 2005
hands waving dollar bills in the air

Sun's grid: lights on, no customers

Many of you will remember the fanfare and bravado surrounding Sun Microsystems' Sep. 2004 announcement of a $1 per hour per processor utility computing plan. What you won't remember is Sun revealing a single customer using the service. That's because it hasn't. The missing customers prove quite shocking when you consider that …
Ashlee Vance, 25 Oct 2005
fingers pointing at man

Katrina-themed malware attack hits the net

Hurricane Katrina is bringing out the worst in people on the net as well as on the streets of New Orleans. Spam emails purporting to offer links to news about Katrina are been used to tempt potential victims onto a site hosting Trojan malware. The site exploits well-known IE vulnerabilities to install a variety of Trojans …
John Leyden, 02 Sep 2005
The Register breaking news

Secure Computing snaffles Cyberguard

Secure Computing has announced plans to acquire rival security firm CyberGuard in a cash and stock transaction valued at approximately $295m. The deal allows Secure Computing to expand its portfolio to include CyberGuard's all-in-one security appliance and web filtering products as well as expanding its market footprint. The …
John Leyden, 19 Aug 2005
For Sale sign detail

MasterCard hack spawns phishing attack

Fraudsters have been quick to launch phishing attacks in a bid to cash in on the publicity surrounding a security breach involving MasterCard International that may affect up to 40 million credit card holders. The crude and misspelled phishing attack, spotted by Secure Computing, is unlikely to fool many but illustrates how …
John Leyden, 20 Jun 2005
channel

Microsoft running late in virtualization

Microsoft's Next Generation Secure Computing Base (NGSCB), conceived originally as hardware-based Digital Rights Management (DRM) for Longhorn, is morphing into server virtualization, Gartner Group says. The analyst expects NGSCB to appear in a second release of the Longhorn client, which it thinks will ship between mid-to-end …
Gavin Clarke, 19 May 2005
channel

Microsoft reveals hardware security plans

Can trusted computing hardware deliver security without locking out competition, asks SecurityFocus's Robert Lemos. The next version of Windows, codenamed "Longhorn," will have security features to take advantage of the trusted computing hardware now showing up in the marketplace, Microsoft executives announced on Monday. The …
Robert Lemos, 26 Apr 2005
homeless man with sign

CyberGuard snags anti-spam outfit Zix for $3.6m

Security firm CyberGuard has bought the anti-spam, anti-virus and URL filtering business of Zix Corporation for $3.6m in cash. The deal - announced Monday, 14 March and approved by the boards of directors of the two companies - will see Zix's Web Inspector and Message Inspector products moved over to CyberGuard's portfolio. The …
John Leyden, 14 Mar 2005
The Register breaking news

We were sold into porn slavery, cry African islands

The government of the tiny African islands Sao Tome and Principe has made a terrible discovery - it has been sold into porn slavery. The country' infrastructure minister, Deolindo Costa de Boa Esperanca, was intrigued to find out what this Internet thing was when the Net's overseeing organisation ICANN held its annual meeting …
Kieren McCarthy, 20 Dec 2004