Articles about Targets

Mike Rogers

NSA snoops told: Get your checkbooks and pens ready for a cyber-weapon shopping spree

NSA and US Cyber Command boss Mike Rogers has revealed the future direction of his two agencies – and for the private sector, this masterplan can be summarized in one word. Kerching! Speaking at the West 2017 Navy conference on Friday, Rogers said he is mulling buying up more infosec tools from corporations to attack and …
Iain Thomson, 25 Feb 2017
Girl drinking photo via Shutterstock

Microsoft offers Dynamics 365 data-sucking stoppage

A version of Microsoft Dynamics 365 with cloud turned off is coming in the second quarter. Dynamics 365 “local business data” is for deployment on premises with synchronization to Microsoft’s cloud turned off and data stored locally rather than on Microsoft's own servers. The system targets large Microsoft clients reluctant …
Gavin Clarke, 24 Feb 2017
trappist1

Pack your bags! NASA spots SEVEN nearby Earth-sized alien worlds

Pics and video NASA has discovered a mini solar system of seven Earth-sized planets orbiting a small cool dwarf star, including three within the Goldilocks zone where liquid water is possible. Last year, a telescope in Chile – dubbed the TRAPPIST aka the TRAnsiting Planets and PlanetesImals Small Telescope – spotted two planets orbiting an …
Iain Thomson, 22 Feb 2017
Ben Mezrich, Once Upon a Time in Russia: The Rise of the Oligarchs and the Greatest Wealth in History

Hacking group RTM able to divert bulk financial transfers with malware

Cybercrime group RTM is deploying complex malware based in the Delphi programming language to target Remote Banking Systems (RBS), a type of business software used to make bulk financial transfers. The problem was severe enough to warrant an advisory from FinCERT, a Russian CERT responsible for fighting cybercrime targeting …
John Leyden, 21 Feb 2017

TeamSpy hackers get the crew back together after four-year hiatus

Updated Cybercrooks have once again begun slinging malware that subverts elements of the legitimate TeamViewer remote control app to snoop on victims. The tactic was previously seen in 2013. Attacks typically begin with booby-trapped emails harbouring malicious attachments that pose as eFax messages. If installed, the malicious code …
John Leyden, 21 Feb 2017
Official gag photo via Shutterstock

UK Snoopers' Charter gagging order drafted for London Internet Exchange directors

Exclusive London Internet Exchange (LINX) – Europe's major internet traffic hub – faces a growing backlash over changes to its rules that would gag its directors applying secret government orders to monitor networks, under Britain's Investigatory Powers Act. LINX members – hundreds of internet companies – have been given less than two …
Duncan Campbell, 17 Feb 2017
Facebook Lite app

US visitors must hand over Twitter, Facebook handles by law – newbie Rep starts ball rolling

A newbie congressman has floated his first ever US law bill – one that demands visitors to America hand over URLs to their social network accounts. House Rep Jim Banks (R-IN) says his proposed rules – dubbed the Visa Investigation and Social Media Act (VISA) of 2017 – require visa applicants to provide their social media …
Shaun Nichols, 17 Feb 2017
Parliament photo by Shutterstock

Identity disorder: Does UK govt need Verify more than we do?

Comment One problem writing about government IT is that after a while it feels a bit like Groundhog Day – a syndrome that must be even more pronounced for the folk working in it. Six years ago I remember clearly being walked through the reasons why the British government needed an online identification tool to enable citizens to use …
Kat Hall, 16 Feb 2017

Revealed: Web servers used by disk-nuking Shamoon cyberweapon

A detailed analysis of the Shamoon malware – which is playing a huge role in the cyberwar between Saudi Arabia and Iran – has identified servers used to spread the software nasty. Shamoon surfaced in 2012 when it infected 30,000 workstations in the world’s largest oil production firm, Saudi Aramco, wiped their hard drives, and …
Iain Thomson, 16 Feb 2017

Kremlin-linked hackers believed to be behind Mac spyware Xagent

Kremlin-linked spies have been blamed for cooking up malware called Xagent, which targets victims running macOS to steal passwords, grab screenshots and exfiltrate iPhone backups stored on the Mac. Preliminary analysis by security software firm Bitdefender has uncovered links to the APT28 cyber-espionage group, elsewhere …
John Leyden, 15 Feb 2017
Robot looks into magnifying glass, human eye displayed. Photo by Shutterstock

Meet LogicLocker: Boffin-built SCADA ransomware

Let's start with the “calm down” part of the article: yes, LogicLocker is ransomware designed for programmable logic controllers, but no, the cyber-geddon isn't upon us. LogicLocker is a proof-of-concept written by David Formby, Srikar Durbha and Raheem Beyah of Georgia Tech (Formby and Beyah also disclose an affiliation with …

ASLR-security-busting JavaScript hack demo'd by university boffins

Researchers in Europe have developed a way to exploit a common computer processor feature to bypass a crucial security defense provided by modern operating systems. By abusing the way today's CPUs manage system memory, an attacker can discover where software components, such as libraries and RAM-mapped files, are located in …
Shaun Nichols, 14 Feb 2017
James Franco clutches puppy alongside Seth Rogen in a still from The Interview

Worldwide bank attack blitz linked to Sony Pictures hacking crew

Evidence has surfaced that hackers blamed for the infamous Sony Pictures hack and the notorious Bangladesh Central Bank account heist have launched a fresh wave of assaults. The so-called Lazarus hackers are currently targeting scores of banks and other organisations across 31 countries, Symantec warns. The attacks appeared …
John Leyden, 13 Feb 2017
Light bulb photo via Shutterstock

Sales 'smasher' Simon Niesler lands role as SAP UK cloud supremo

SAP has moved the UK corporate brass in a move that could propel cloud sales, The Reg has learned. The giant, which in January adjusted its existing 2020 full-year cloud sales target, has appointed an internal rising star to lead all UK cloud sales. Simon Niesler has become vice president of UK cloud, a role spanning HANA …
Gavin Clarke, 13 Feb 2017
Traditional lattice pylons in the UK countryside

As South Australia blacked out, PM's office was told renewable power was not to blame

Following last year's megastorm and blackout in South Australia, Vulture South opined that the events had nothing to do with the state's use of wind power. Now, a freedom of information release reveals the government was advised to that effect before ministers started to cast blame. Left-of-centre think tank the Australia …
CSIRO's PAF being hoisted into position at Parkes

Interview: AARNet's Peter Elford on Australia's national research infrastructure

Australia is re-crafting the roadmap that guides its national research infrastructure, a task that covers everything from the network to the nation's high performance computing systems. The roadmap from the Office of the Chief Scientist was offered for public comment late last year. Guided by the hand of chief scientist Alan …

Ex-NSA contractor Harold Martin indicted: He spent 'up to 20 years stealing top-secret files'

Former Booz Allen Hamilton contractor Harold Thomas Martin III allegedly stole secret and top-secret software and documents from American intelligence agencies for up to 20 years. That's according to a federal grand jury indictment revealed today. The legal paperwork [PDF] lays out the US Department of Justice's case against …
Image by Arak Rattanawijittakorn http://www.shutterstock.com/gallery-2364116p1.html

Phishing: Another thing we can blame on Brexit

Ransomware attacks are increasingly focusing on organisations that are more likely to pay up, such as healthcare, government, critical infrastructure, education, and small businesses. Phishing volume grew by an average of more than 33 per cent across the five most-targeted industries, according to a study by PhishLabs out …
John Leyden, 07 Feb 2017
Hacker

UK defence secretary: Russian hacks are destabilising Western democracy

The UK defence secretary has accused Russia of using hacking to destabilise the West. Sir Michael Fallon said the Kremlin is "weaponising misinformation" as part of a sustained campaign that goes beyond alleged meddling in the 2016 US presidential election. NATO needs to do more to combat the threat, the senior cabinet …
John Leyden, 03 Feb 2017
PWX_image

Fused box: Look who's containerizing storage, security and apps

Comment Containerized apps will gravitate to using containerized system services such as storage and security. In the DevOps world, containerized apps run inside hosts, and system services such as security and storage are containerized as well. Outside that ideal world, these services are often linked to containers by some interface …
Chris Mellor, 03 Feb 2017
Hippie peace, image via Shutterstock

It's holistic, dude: How to dodge the EU's £17m data regulation sting

Sysadmin blog Holistic IT is hard. There are those among us who want to purchase hardware, software, services or so-called turnkey "solutions" – as vendors call them – bearing logos and stickers and otherwise don't require any architect-level thinking. None of us wants to dive deep into compliance regimes to understand what we need to do. …
Trevor Pott, 02 Feb 2017

Suffered a breach? Expect to lose cash, opportunities, and customers – report

More than a third of organisations that experienced a breach last year reported substantial customer, opportunity and revenue loss. The finding is one of the key takeaways from the latest edition of Cisco's annual cybersecurity report, which also suggests that defenders are struggling to improve defences against a growing …
John Leyden, 31 Jan 2017
Cthulu emerges from a printer. Image created by illustrator Andy Davies. Copyright: The Register

We don't want to alarm you, but PostScript makes your printer an attack vector

Take your printers off the Internet: a bunch of researchers from a German university have found a cross-site printing bug in the ancient PostScript language. If PostScript is the printer driver, the printer is vulnerable to what they call Cross-Site Printing attacks, documented in detail at Hacking Printers here. The bugs …
Toilet with smiling loo paper

Counter-terror cops arrest pair for sending poo-smeared toilet paper to public figures

An Italian couple have been nicked by counter-terror cops for, some, er, smearing letters they had sent to public figures. According to the Italian rozzers, over a two-year spree, the 71-year-old and his 54-year-old partner sent threatening and defamatory letters to high-profile targets, which also contained toilet paper …
Team Register, 27 Jan 2017
Pennies in a jar. Photo via Shutterstock

Oracle sues its own star sales rep after she wins back $200k in pay fight

Oracle, which requires salespeople to agree to binding arbitration to avoid costly disputes in court, is unhappy that an arbitrator ruled against it. So it is suing one of its own employees, applications account manager Felicia Wilson, in a New York court to undo the arbitrator's $257,335.79 award. That's the amount Oracle …
Thomas Claburn, 26 Jan 2017
Liam Neeson Taken

I don't care what your eyeballs tell you. Alternative fact is, we've locked up your files

Two in five large UK businesses have fallen victim to a "bluff" ransomware attack, according to a new survey. "Bluff" ransomware attacks involve cybercriminals falsely claiming that malicious software has successfully infected an organisation's network before demanding an extortionate payment in return for the "encryption key …
John Leyden, 24 Jan 2017
Tavis Ormandy's WebEx Proof-of-concept

Cisco's WebEx Chrome plugin will execute evil code, install malware via secret 'magic URL'

Updated Malicious websites can remotely execute commands on Windows systems that have Cisco WebEx's Chrome extension installed. About 20 million people actively use this broken software. All attackers need to know is a “magic URL” hidden within WebEx, Google Project Zero bug hunter Tavis Ormandy revealed on Monday. We think a secret " …
Fox licks his chops. Photo by Shutterstock

Sigfox veep: Our gear will be less pricey than kit for NB-IoT customers

French Internet of Things connectivity folk Sigfox are still hoping for a 2018 IPO – but it is not an "end in itself", a company rep told The Register. "We favour a startup approach," said Thomas Nicholls, Sigfox's exec veep of comms. "It should happen at the right time, when the market is ready." Last year Sigfox quietly let …
Gareth Corfield, 20 Jan 2017
Cohesity C2000

Ain't no party like an 80-plus-customer Cohesity party

Analysis Secondary storage silo converging startup Cohesity has added entry-level hardware as it reaches 80+ customers and 100+ US resellers. The existing scale-out C2300 and C2500 systems have 12-48TB and 24-96TB of disk capacity and 800GB-3.2TB and 1.6TB-6.4TB of PCIe flash, respectively. The C2100 slots in underneath these systems …
Chris Mellor, 20 Jan 2017
Penguins pool photo via Shutterstock

Wintel part deux? Microsoft Azure first for Intel Clear Linux

An alliance that dominated the PC industry is entering the world of fluffy white stuff and open source: Microsoft Azure is the first public cloud to include an Intel initiated and container-oriented Clear Linux OS. The Wintel union loosened with the rise of Linux - runing on x86 - and the fall of the PC as peoples' primary …
Gavin Clarke, 19 Jan 2017

'Ancient' Mac backdoor discovered that targets medical research firms

Security researchers at Malwarebytes have discovered a Mac backdoor using antiquated code that targets biomedical research facilities. The malware was probably created years ago but has only recently been discovered. Malwarebytes speculates that it wasn't found before because it was only ever used in targeted attacks, limiting …
John Leyden, 18 Jan 2017
Navy

Smart bombs, smart bullets – now guided smart artillery shells, thanks to DARPA dosh

DARPA, the boffinry nerve-center of the US military, has awarded a contract to develop a cross between a missile and an artillery shell for use by the Navy. Dubbed the Multi-Azimuth Defense – Fast Intercept Round Engagement System (MAD-FIRES) program, the proposed projectile will combine the precision and maneuverability of a …
Iain Thomson, 18 Jan 2017

911 app is a joke, says security researcher Randy Westergren

The Rave Panic Button app, designed to allow businesses to summon emergency services, allows miscreants to easily 'swat' targets by making false reports of emergencies says security researcher Randy Westergren. The app, which has a small install base of up to 10,000 users, has shuttered the holes Westergren identified. The …
Darren Pauli, 17 Jan 2017

Nielsen, eat your heart out: TiVo woos admen with prediction engine

Analysis More data means better performance for advertising – at least on the digital side. Increasingly, marketers are looking to inject data-driven decision making into the “dumbest” box in the house: the TV set. “The whole television industry used to be based on age, gender demographics, in terms of television buying and planning,” …
Faultline, 16 Jan 2017
Boss leans back comfortably in desk. Pic via Shutterstock

Outage-hit Lloyds Bank in talks to outsource data centres to IBM

Exclusive In the week that Lloyds Banking Group suffered multiple outages, it has emerged the UK financial giant is negotiating to outsource management of its bit barns to IBM Global Business Services. Online services were interrupted on Wednesday and Thursday by unspecified technical glitches that prevented people from logging into …
Paul Kunert, 13 Jan 2017
The Japanese pulsar-snooping balloon

A deduping backup target startup going public – who'd a thought it?

Exagrid, whch produces deduping disk backup target arrays, announced record revenue for the fourth 2016 quarter; its 12th,consecutive cash-positive quarter. It grew double digits over the previous quarter and same quarter of the prior year as well as for the full year of 2016 over 2015. The company wants to increase the …
Chris Mellor, 12 Jan 2017

Brother-and-sister duo arrested over hacking campaign targeting Italy's bigwigs

A hacking operation featuring the EyePyramid trojan successfully compromised the systems of numerous high-profile Italian targets, including two former prime ministers, say Italian police. High-profile targets were targeted by a spear-phishing campaign that served a remote-access trojan codenamed "EyePyramid" as a malicious …
John Leyden, 12 Jan 2017
Hippie peace, image via Shutterstock

Peace-sign selfie fools menaced by fingerprint-harvesting tech

Researchers from Japan's National Institute of Informatics say people's fingerprints could be extracted from photographs using yet-to-be built technology. The eggheads warn that fingerprints can be copied from photographs snapped up to three metres from targets. Prints would need to be captured clearly in strong lighting, …
Darren Pauli, 12 Jan 2017

BBC surrenders 'linear' exclusivity to compete with binge-watch Netflix

The BBC is abandoning linear exclusivity as it goes for broke to make the iPlayer a global Netflix rival. The corporation says it will throw entire series on to the on-demand streaming service before the first episode in a series is even broadcast on terrestrial TV. Director-General Tony Hall will call for the BBC to "reinvent …
Andrew Orlowski, 11 Jan 2017
Raining money

British Hadoop security startup expands to New York to land big investor

British security startup Panaseer is expanding to New York from London as it plans to land a large American investor in 2017. Panaseer will remain headquartered in London, where it develops its proprietary Security Data Lake to bring "the application of data science, advanced security intelligence and data engineering" to its …
Smart phone crowd photo via Shutterstock

Citrix buys Unidesk for massive Microsoft Windows rollouts

Citrix is updating its decades-old relationship with Microsoft, targeting Windows 10 and the cloud. The company has announced its acquisition of Unidesk – founded in 2007 and inventor of what it calls layering - to streamline corporate rollouts of virtual Windows applications at scale. Layering is a container that wraps up …
Gavin Clarke, 10 Jan 2017

Why the UK is unlikely to get an adequacy determination post Brexit

Opinion This article adds two reasons to why I think a post-Brexit UK is very unlikely to offer an adequate level of protection in terms of the General Data Protection Regulation (GDPR). One reason relates to recent comments made by Prime Minister Theresa May about human rights. The other relates to the non-compliance of the national …
Ransomware, photo via Shutterstock

Ransomware sleazeballs target UK schools

Cybercrooks are targeting UK schools, demanding payments of up to £8,000 to unlock data they have encrypted with malware. Action Fraud warns that fraudsters are cold-calling schools claiming to be from the Department of Education and asking for the head teachers’ email addresses. Crooks then send booby-trapped emails with …
John Leyden, 06 Jan 2017
LEGO BOOST robot photo LEGO

BOOST! LEGO's computing future and its ground-breaking past

CES 2017 Smart Wi-Fi-enabled hairbrush? Virtual reality shoes? Some visions of the future at this week's CES trade show simply won’t materialise. But what about building a 'bot made of LEGO? Toymaker LEGO unveiled its Boost line this week at CES – a set of 840 programmable bricks for your kids to control self-made robots with. Boost …
Gareth Corfield, 06 Jan 2017

D-Link sucks so much at Internet of Suckage security – US watchdog

America's trade watchdog is suing D-Link, alleging the router and camera vendor failed to implement basic security protections in its gear. The FTC said that its complaint was based on D-Link's failure to take "reasonable steps" to secure its products, putting the privacy of citizens everywhere at risk as a result. "Hackers …
Shaun Nichols, 06 Jan 2017

British military laser death ray cannon contract still awarded, MoD confirms

The Ministry of Defence has today re-announced for the third time that it has awarded a £30m contract to build a great big feck-off laser cannon for zapping the Queen's enemies. Originally awarded in July 2016 to the Dragonfire consortium, the Laser Directed Energy Weapons (LDEW) contract immediately stalled after a challenge …
Gareth Corfield, 05 Jan 2017
Africa Studio http://www.shutterstock.com/gallery-137002p1.html

Ransomware scum: 'I believe I'm a good fit. See attachments'

Criminals are posing as job applicants to drop ransomware into human resources departments. The ransomware vector contains two attachments. One is a harmless PDF cover letter designed to convince the human resources operative that the criminal's email exchange is legitimate. A second Excel spreadsheet attachment contains the …
Darren Pauli, 05 Jan 2017

Army social media psyops bods struggling to attract fresh blood

Army social media psyops unit 77 Brigade is struggling to reel in new government cyber-warriors in spite of a recruitment publicity blitz last year, according to the Ministry of Defence. The "brigade" – in reality a unit slightly smaller than an infantry battalion, with a target manning strength of 448 people – is under …
Gareth Corfield, 03 Jan 2017
LInux nutella

Ridiculously small Linux build lands with ridiculously few swears

The latest Linux 4.10-rc2 build nearly didn't happen because L-triptophaniac developers were Christmassing, but Linus Torvalds decided to set it free as a New Year treat. Explaining the build, Torvalds wrote that “rc2 is ridiculously and unrealistically small. I almost decided to skip rc2 entirely, but a small little …
NYC

Trio charged with $4m insider trading by hacking merger lawyers

US prosecutors have charged three Chinese men with making more than $4m (£3.2m) by allegedly trading on information obtained from hacking top merger and acquisition law firms. The defendants are charged with targeting at least seven top international law firms with offices in New York, which advised companies on corporate …
Kat Hall, 28 Dec 2016