Feeds

Articles about Target

The Register breaking news

Adware-flinging Yontoo yahoos target Mac users: You like trailers, right fanboi?

Miscreants are coining it by infecting fanbois beloved Apple boxes with a well-known ad-injecting Trojan previously only found on Windows machines. Trojan.Yontoo.1, the specially crafted Mac OS X version, penetrates computers running OS X by offering what purports to be a browser plugin necessary to view content, but is actually …
John Leyden, 22 Mar 2013
Downing Street road sign

The target: 25% of UK gov IT from small biz... The reality: Not even close

The UK government is way off its target of sourcing a quarter of its IT gear and services from small businesses by 2015. That's according to a report out this month by Parliament's Public Accounts Committee (PAC) that criticises the government's ICT strategy. The panel, chaired by Labour backbencher Margaret Hodge, interviewed …
Paul Kunert, 23 Sep 2013
Scott Dietzen before (L) and after (R) shaving his head

Pure Storage developing converged systems

Pure Storage is set to build converged server and storage systems "to compete with commodity server hardware", said CEO Scott Dietzen, as the highly funded startup enters the next phase of its development. In a blog Dietzen wrote: The opportunity for Pure will be more about shaping the next-generation of cloud and web-scale …
Chris Mellor, 27 Oct 2014

Ultimate hardware hack: Home Depot nailed by vice merchants

Do-it-yourself kingpin Home Depot has confirmed a report it was breached indicating the compromise occurred in April this year. The US retail chain was working with law enforcement over compromise of payment terminals across stores in the country. Chief executive of the hacked firm Frank Blake admitted the breach in a terse …
Darren Pauli, 09 Sep 2014
Dunce

Opposition: we passed Australia's 'spook's charter' on PURPOSE

Australia's opposition has defended its stance on Australia's new national security laws, which provide maximum ten-year jail sentence for nat-sec leakers, by leaking its leader's attitude to a national media outlet. The draconian laws also allow ASIO to apply for a warrant to invade a computer network – without any limit on the …

Symantec offers BIGGER, FASTER NetBackup appliance

Symantec is refreshing its NetBackup 5000 series appliance line with a new model that operates faster and holds more data. The firm's 5000 Series Purpose-Built Backup Appliance (PBBA) range has expandable storage and end-to-end (both client and target sides) deduplication for physical and virtual environments. The existing 5230 …
Chris Mellor, 03 Oct 2014

By the way, Home Depot hackers also grabbed 53 million email addresses

Hackers made off with a whopping 53 million email addresses as part of the high profile April breach of Home Depot in which 56 million credit cards were compromised, the company says. The haul bagged enough email addresses to contact everyone in England, but it was unknown if the information had been implicated in further …
Darren Pauli, 07 Nov 2014
Apple iPad 3 aka new iPad

Larger iPad could target big biz, save Apple from low-end scrum

As has been increasingly the case with smartphones, the tablet market is shifting away from an Apple/Samsung head-to-head, and becoming a free-for-all. While the two major suppliers still lead the sector, their sales declined in the second quarter, even though overall shipments were up. Apple may look to address the challenge in …
Wireless Watch, 29 Aug 2014

Attackers tapping on SNMP door to see if it's open

Google's DNS IP address is being spoofed by an attacker, apparently in an attempt to DDoS hosts vulnerable to a flaw in the SNMP protocol. The SANS Internet Storm Center noticed the traffic trend emerging on September 15, and in this post discusses what's going on. The attack is trying to take over SNMP hosts that have left …

Raspberry Pi DUMBS DOWN to target world+dog

The Raspberry Pi was conceived of as a device so cheap that anyone could buy one, but also just raw enough that putting the computer to work would require users to learn a little about topics like installing operating systems and confronting BIOS settings. It turns out that “put some people off” to the extent they shelved their …
Simon Sharwood, 06 Jun 2013
Artist's rendering of the concave Vdara hotel

Feeling safe in your executive hotel suite, Mr CEO? Well, DON'T

Corporate bosses are coming under attack from a shadowy new group that spreads malware by hijacking the networks of luxury hotels. Kaspersky Labs' Global Research & Analysis Team has issued a warning about an advanced persistent threat designed by a crew called Darkhotel, who target top execs as they relax in plush hotel rooms …
Jasper Hamill, 10 Nov 2014
The Register breaking news

New target for 419 fraudsters: Struggling 'weak' banks

Desperate banks have become the target for so-called 419 advance-fee fraud scams. Increased regulatory scrutiny in the wake of the credit crunch and subsequent banking failures might be expected to deter banks from entertaining investment or deposit offers that come with up-front fees, payable by the bank, attached. But many …
John Leyden, 02 Aug 2012
Spam

Malware-flingers target gullible corporate bods with office printer spam

Sneaky cybercrooks are disguising links to malicious sites in spam emails posing as messages from Hewlett-Packard ScanJet printers. The attack takes advantage of the fact corporate users often receive emailed messages from scanners and multi-function printers located in their own offices, which contain attachments of the scan …
John Leyden, 09 Apr 2013

Beware Brit cops bearing battering rams. Four nabbed over Trojan claims

British cops have arrested four people suspected of using Trojans to illegally take control of computers. The arrests were made as part of a international operation led by Europol which aimed to clamp down on the criminal use of Remote Access Trojans (RATs). These malware nasties are capable of taking command of a target's …
Jasper Hamill, 21 Nov 2014

Carders offer malware with the human touch to defeat fraud detection

A new cybercrime tool promises to use credit card numbers in a more human way that is less likely to attract the attention of fraud-detection systems, and therefore be more lucrative for those who seek to profit from events like the Target breach. The "Voxis Platform" is billed as "advanced cash out software" that promises to …
Darren Pauli, 30 Oct 2014
chalk outline of  human body at crime scene

Rise of the Machines: FIRST HUMAN VICTIM – 2015

Death via internet, online contract killers and crime-as-a-service were just three of the scarier elements discussed by international top cops at the Interpol-Europol cybercrime summit in Singapore last week. The Internet Organised Crime Threat Assessment, a report prepared by Europol’s cybercrime division, warns that the so- …
Jennifer Baker, 06 Oct 2014
The Register breaking news

Broadband minister admits rural rollout by 2015 is 'challenging target'

Broadband minister Ed Vaizey has confessed that the government's £530m pledge to deploy a faster fibre network to rural areas by 2015 is "a challenging target". Speaking with MPs on the Environment, Food and Rural Affairs Select Committee, Vaizey said that his department was "running as fast as we can" to deliver on time. …
Kelly Fiveash, 29 Nov 2012
apple_macbook_pro_13in_core_i5

Rent-seekers target school laptops in Oz election year

School, parent and teacher lobbies around Australia are gearing up to persuade the government to continue funding the laptops-in-schools program due to expire in June 2013. As noted in the National Partnership Agreement on the Digital Education Revolution (available here), the funding formalised between the federal government …

Ditching renewables will punch Aussies in the wallet – Bloomberg

The Australian government's plan to scrap its Renewable Energy Target (RET), pitched as a way to cut power bills down under, will drive up electricity prices. That's according to an analysis by Bloomberg New Energy Finance (NEF). Bloomberg NEF believes that while the short-term (2015 to 2020) cost of the RET to consumers is AU$ …
Rosetta selfie

'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet

The European Space Agency has maneuvered its Rosetta probe into the perfect position for a selfie with its target – comet 67P/Churyumov-Gerasimenko. Rosetta selfie "Breaker one-nine, this here's the Rubber Duck" (click to enlarge) The image was taken on September 7 using cameras on Rosetta's Philae lander that will …
Iain Thomson, 10 Sep 2014
USB Stress Panic Button

Police at the door? Hit the PANIC button to erase your RAM

The next time the police kick down a hackers' door, suspects can reach for the Panic button to make it nigh-on impossible for plod to recover any data, even if they freeze their target PCs. The Panic button is a new Python app called "Centry Panic" and was developed to mitigate cold boot and direct memory access attacks on …
Darren Pauli, 28 May 2014
Curiosity self-portrait at Rocknest in the Gale Crater

NASA's Curiosity rover set to give Mars its THIRD HARD DRILLING

NASA’s Curiosity team has signed off on the newest drilling site for the Martian rover – and plans to stick its third ever hole on the planet into the Windjana rock in the next few days. Dusted off area of the Windjana drilling target for Curiosity Dusted off area of the Windjana drilling target for Curiosity. Credit: NASA/JPL …

Citadel Trojan phishes its way into petrochem firm's webmail

Trusteer researchers are saying that the victims of the latest round of Citadel trojan infections includes one of the largest petrochemical companies in the world. The attacks, like so many others, targeted critical infrastructure organisations using phishing campaigns to steal network credentials. Researcher Dana Tamir said …
Darren Pauli, 17 Sep 2014

Arts and crafts store Michaels says 3 million credit cards exposed in breach

As the officials investigating the Target data breach are settling in for what they believe will be a long and complex process of catching the hackers behind the heist, another US retailer is admitting that it lost millions of customer payment card details. Arts and crafts store chain Michaels said that it has confirmed the …
Shaun Nichols, 18 Apr 2014

Revealed ... GCHQ's incredible hacking tool to sweep net for vulnerabilities: Nmap

For the past five years, British spying nerve-center GCHQ has been port scanning internet-connected computers in 27 countries – in a exhaustive hunt for systems to potentially exploit. That bombshell comes amid fresh leaks detailing the dragnet surveillance programs operated by the Five Eyes nations: America, UK, Canada, …
John Leyden, 15 Aug 2014

POISON PI sniffs WiFi from your mail room, goes on rampage

Security bod Larry Pesce has developed a chopping board-sized hacker package as an inexpensive weapon for hacking wireless networks through the post. The device is designed for so-called "war shipping" attacks described (vid) last year in which hacking hardware is posted to a target organisation with the aim of attacking …
Darren Pauli, 03 Oct 2014
The Register breaking news

NASA picks the target for Curiosity's first road trip

NASA has pronounced the Curiosity rover ready to get roving and has picked an interesting venue for its first roll across the Martian surface, but the probe has to shoot itself before it can go anywhere. At a press conference on Friday, NASA said that Curiosity will move towards a spot dubbed Glenelg, which is located at the …
Iain Thomson, 18 Aug 2012

FBI impersonated newspaper to finger school bomb threat suspect

A US newspaper has reacted angrily after it emerged that the FBI impersonated its website in order to locate a target using snoopware. The Feds set up a fake Seattle Times news story on a counterfeit website in order to entice a bomb-threat suspect to disclose his location back in 2007. Links to the doctored story were sent to …
John Leyden, 28 Oct 2014
BrickArms' Toy taliban figure

Jihadist fears spark new spook powers

Australia's federal government is reportedly about to use Australians travelling to fight with jihadists in Syria as the basis for giving new local powers to ASIO. The Daily Telegraph has been briefed by cites “intelligence sources” as saying that laws soon to go to parliament will give the Australian Security Intelligence …
PCS with a red X in front of them

Swiping your card at local greengrocers? Miscreants will swipe YOU in a minute

More than a thousand point-of-sale, grocery management and accounting systems worldwide have been compromised by a new strain of malware, results of a March 2014 probe have revealed. During a survey of compromised POS terminals, accounting systems and grocery management platforms, the Nemanja botnet was fingered as one of the …
John Leyden, 27 May 2014

Secret Service probes possible data-leak hack attack at Sears – report

The US Secret Service is helping to hunt for evidence of a possible computer security breach at retail giant Sears, it was claimed today. Bloomberg cited sources familiar with the matter in reporting that the company was working with Uncle Sam's g-men and digital forensics experts at Verizon to probe a possible network …
Shaun Nichols, 01 Mar 2014

Home Depot: Someone's WEAK-ASS password SECURITY led to breach

Hackers gained access to Home Depot's network via a third-party vendor system, according to preliminary results of an investigation into the September mega-breach. Cybercrooks used access to the US retail giants' network gained via ineffective password security at an unnamed third party vendor's system to run a stepping-stone …
John Leyden, 07 Nov 2014

Protestors target Google over that video

Google's London office was barricaded on Sunday, after thousands of protestors marched in protest against youTube's continued hosting of the controversial film, The Innocence of Muslims. London's Daily Telegraph says 10,000 protestors participated. The BBC preferred a figure of “up to 3500” and says the peaceful protest aimed to …
Simon Sharwood, 15 Oct 2012
The Register breaking news

UK the 'number 1 target' of online gangsters in 25 countries - e-crime report

The UK is failing to win the war on "e-crime", according to MPs on the Home Affairs committee in its first ever report on online crime. The committee published its "Report on e-crime" on Tuesday following hearings over 10 months, where the MPs heard from senior police officers as well as experts from academia, banks and the IT …
John Leyden, 30 Jul 2013
server room

Recovery-ware upstart Zerto: From Hyper-V to VMware and back again

In a blow against hypervisor lock-in, Recovery-ware startup Zerto has extended its VMware hypervisor-based technology to embrace Hyper-V, providing cross-hypervisor replication from VMware to Hyper-V or vice versa. Virtual machines can now be continuously protected by Zerto's changed block-level replication to a second server or …
Chris Mellor, 27 Oct 2014
australian credit cards fraud contactless

Credit card thieves setting up safe seller certifications

In the world of carding, you get what you pay for: stolen cards are cheaper on riskier public trading forums and more pricey on closed more reliable markets, according to recent analysis. Since 2007, Michigan State University associate professor Thomas Holt, University of North Carolina assistant professor Olga Smirnova and Yi- …
Darren Pauli, 08 Oct 2014
A watch with hands

Chumps stump up $1 MEELLLION for watch that doesn't exist

An Indiegogo project to build a watch that projects its display onto your hand has blown the doors off its target by raising a million dollars in funding – even though no functional device has yet been built. The Ritot watch uses a DLP matrix in a wristband to project an image on to the back of the wearer's hand. In addition to …
Simon Rockman, 01 Sep 2014
Curtis Clark Green, former Silk Road admin

'I WAS AN ADMIN FOR SILK ROAD': Alleged hit-man target tells all

The former Silk Road employee whom the website's founder allegedly tried to have killed has testified in a Baltimore, Maryland court, casting fresh light on the murky inner workings of the now-defunct online drugs market. Curtis Clark Green, 47, appeared in the federal court to plead guilty to charges of drug trafficking, …
Neil McAllister, 08 Nov 2013

Google's Dart on target to replace JavaScript? That'll be the day

Last week, Google announced that the international standards body Ecma had formed a new technical committee devoted to Dart, the Chocolate Factory's homegrown web browser scripting language. But don't expect Dart to replace JavaScript as the web's lingua franca anytime soon. "The new standardization process is an important step …
Neil McAllister, 16 Dec 2013
The VoCore COM

DIY IoT computer smaller than a square inch

A Chinese crowd-funded effort has produced what could be – for now, at least – the smallest Linux computer-on-module so far, and with its research effort oversubscribed, says it will be shipping its “VoCore” devices by October 2014. The 25 x 25mm embedded system isn't designed for fat compute loads, but at a list price of $US20 …
Brute Force

Retailers shot up by PoS scraping brute force cannon

The US Computer Emergency Response Team has warned of a new point of sale malware that is targeting retailers. The malware is a RAM-scraper of the kind made infamous by the Target breach that saw attackers plant wares on terminals to nab credit cards while they were temporarily unencrypted. This attack uses a new tool delivered …
Darren Pauli, 01 Aug 2014
The Register breaking news

NASA aims Curiosity's percussive drill at pink, veiny target

NASA has selected the first site for the Curiosity rover to drill into, the first time a man-made object has penetrated the bedrock of the Red Planet. "Drilling into a rock to collect a sample will be this mission's most challenging activity since the landing. It has never been done on Mars," said Mars Science Laboratory project …
Iain Thomson, 16 Jan 2013

Kickstarter hopefuls promise high-res aerial maps for the masses

San Diego-based Drones Made Easy is nudging the Kickstarter target of $30,000 it needs to bring "mapping to the masses" with an site allowing people to "upload raw aerial imagery for processing into high quality stitched aerial imagery". The idea is to take the grunt work out of creating your own stitched imagery "at up to 20 …
Lester Haines, 05 Aug 2014
Drosophilia under a laser

Linux app lets you control fruit fly brains - with frikkin' LASERS

I, for one, welcome our new insect overlords … a collaboration between researchers in Vienna and the US has produced high-resolution laser-control over fruit flies. If you have access to the necessary kit (cameras and a galvanometer) to track the fruit fly (Drosophila melanogaster in their experiment), plus a 635nm and a 808nm …
Iranian flag flying

Iranian hacktivists move into hardcore hacking against West, dissidents

Security firm FireEye has been tracking an Iranian hacking group that has moved from simple defacement of websites to actively targeting Western defense contractors and those within Iran's borders who are trying to circumvent the regime's censorship firewall. The hacking group, calling itself the Ajax Security Team, has been …
Iain Thomson, 14 May 2014
Disney's Beagle Boys

Kmart apologizes to customers after month-long security breach

Discount store Kmart admitted some customers’ payment cards have likely been “compromised” as it became the latest mega retailer to fall victim to cyber-crims. The parent of the chain, Sears Holding Corp, said the IT team discovered late Thursday that its payment systems had been breached, and further investigations indicate …
Paul Kunert, 12 Oct 2014
Trolls

Yahoo! Saves! Trolls! From! Session! Jacking! Holes!

Yahoo! has patched a cross site scripting (XSS) flaw in the commenting system it uses across many of its properties. The internet giant squished two attack vectors affecting a laundry list of Yahoo! services covering topics as diverse as shopping and sport two weeks after they were reported on May 2nd. Californian web dev and …
Darren Pauli, 20 May 2014

VXers Shellshocking embedded BusyBox boxen

Malware writers have crafted new wares to attack embedded devices running BusyBox and not yet patched against the ShellShock vulnerability, researcher Rhena Inocencio says. Miscreants' tool of choice for such attacks is malware called "Bashlite" that, once executed on a victim machine, probes for devices such as routers and …
Darren Pauli, 17 Nov 2014
management regulation1

US escalates Stingray mobe-snooping secrecy battle as judge unseals evidence

The FBI's long battle to keep details of its controversial Stingray mobile phone-snooping kit under wraps has escalated, with US Marshals raiding Florida police to prevent their records being released, while a Florida judge was busily unsealing court evidence covering the IMSI-catchers. The American Civil Liberties Union had …
Sample-collection drill hole on Martian sandstone target 'Windjana'

Alien invader plunges tool into virgin 'Windjana', sniffs powders

Curiosity, NASA’s nuclear-powered truck on Mars, has drilled into the planet’s surface for the third time, taking a chunk out of a sandstone slab dubbed Windjana. Sample-collection drill hole on Martian sandstone target 'Windjana' Hole in, done ... where Curiosity drilled into the Martian ground (Credit: NASA) The dust-world …