Articles about Targets

The US White House. Pic: Roman Boed

CozyDuke hackers targeting prominent US targets

A newly discovered group of cyber-spies are closely targeting high profile US targets, possibly including both the White House and the State Department. The so-called CozyDuke hackers make extensive use of spear-phishing, sometimes using emails containing a link to a hacked (otherwise legitimate) websites such as "diplomacy.pl …
John Leyden, 22 Apr 2015

Labour has a pop at the government over missed GDS targets

In a pre-election pop at the coalition, Labour has slammed Cabinet Office minister Francis Maude for the Government Digital Service's failure to meet even half of its digital targets for online services. The GDS budget increased from £9.7m in 2011/12 to £23.3m in 2013/14, with spend on IT specialists rising to £7.9m over the …
Kat Hall, 27 Mar 2015

Juniper targets LTE deployments with carrier switches

Juniper has opened the gate to let a couple of carrier routers out of the cage, along with enhancements to its Junos Space network management system. The two devices – the ACX500 and ACX5000 – target mobile backbone networks. The ACX500 is designed for routing traffic from small scale base stations, with system throughput of 6 …

POS malware crooks hack IP cams to validate targets

Carders operating the BackOff point of sales malware are hacking IP cameras to make sure their targets are worth attacking, says researcher Rotem Kerner says. The research plugs a "critical" gap in a July disclosure by the US CERT, which warned the popular carder malware was being flung at businesses using remote desktop …
Darren Pauli, 24 Dec 2014
Threesome photo via Shutterstock

Juniper pals up with Ruckus Wireless, targets Cisco (again)

Juniper Networks is moving to fill out footprint in enterprise wireless access, signing a deal to integrate kit from Ruckus Wireless into its Ethernet switch range. The gin palace has long longed to compete with Cisco in the wireless market. It first tagged the segment as important back in 2003, while more recently dropped US$ …

Ransomware slinging exploit kit targets Flash remote code execution

Attackers have added a recent dangerous Adobe vulnerability to the Magnitude exploit kit, according to respected independent malware researcher "Kafeine". The remote code execution vulnerability (CVE-2015-3113) revealed last week allows attackers to hijack un-patched machines targeting Internet Explorer on Windows 7 and XP. Web …
Darren Pauli, 29 Jun 2015
Embarcadero RAD Studio

Embarcadero’s cross-platform XE8 RAD Studio targets iOS 8, IoT

Embarcadero has released RAD Studio XE8, including Delphi and C++ Builder, with a slew of new features including a 64-bit compiler for Apple’s iOS and support for iOS Universal Apps, including 32-bit and 64-bit in a single binary. Apple requires this for all new iOS apps uploaded to the App Store, so users of earlier versions of …
Tim Anderson, 08 Apr 2015

New EU data chief: 'We share common targets with the United States'

After failing to impress the European Parliament in her grilling last week, the new Commissioner responsible for data protection has further explained her position on agreements with the US and data protection. Asked whether she would suspend the Safe Harbour data sharing agreement with the United States, Věra Jourová said that …
Jennifer Baker, 06 Oct 2014
shutterstock_170724905-Fibre

BT hands £129m back to UK.gov after beating rural broadband targets

Both BT and the Ministry of Fun – or the Department of Culture, Media and Sport, if you prefer – have spun BT’s toeing-the-line-of-a-contractual-obligation as unbridled generosity towards taxpayers. A statement from the Minister of Fun, John Whittingdale, said: It's fantastic to see that the rollout of superfast broadband is …
Simon Rockman, 30 Jul 2015
Flag of Israel; credit James Emery

Snowden latest: NSA targets Gaza, pumps intelligence to Israel

According to the latest drop of leaks from NSA whistleblower Edward Snowden, the US spy agency provides financial assistance, weapons and signals intelligence to Israel. The Intercept reports that Canadian, British and Jordanian signals intelligence is also shared with Israel. This intelligence relates to Palestinian targets, …
John Leyden, 04 Aug 2014
Oil Pump Jack by https://www.flickr.com/photos/paul_lowry/  cc 2.0 attribution

Crude scammer targets Brit oil brokers

Panda Labs researchers have identified a scammer who is fleecing British oil buyers using a malware-free spin on the classic Nigerian scam. They say the scammers steal credentials from oil brokers to swindle buyers across Germany, Spain, and across Asia out of cash. The sting works using a PDF file in the first stage of the …
Darren Pauli, 18 May 2015
Sony smartband talk

Will hottest CES gadgets be HOT TARGETS for hackers?

This year, more than any other, personal technology dominated the conversation at consumer electronics shindig CES. Wearable and mobile technology was showcased at the expo, and many vendors touted the width and breadth of data collected and managed by these devices, What, then, is going to keep hackers from lifting all that …
Shaun Nichols, 09 Jan 2015
Clouds in blue sky

Citrix targets carriers with NetScaler

MWC 2015 Citrix is taking a leap into carrier-grade network function virtualisation (NFV) with a new release of its NetScaler platform. Let's take the numbers first: the two rack unit NetScaler MPX 25000 series is a 160 gigabit-per-second appliance. Citrix says it lets operators crank up the data plane of their SGi-LAN to 3.5 Tbps. The …

Cisco targets India with new investment

In a move interpreted as an endorsement of the new Indian government headed by reformer, and digital service delivery believer, Narendra Modi, Cisco wants to turn around its fortunes in India, and is reportedly putting US$1.7 billion on the table as part of its strategy. The Economic Times reports the commitment, which The Borg …
Broadcom BCM88770

Broadcom targets terabit switch markets with fat StrataDNX chipset

Broadcom wants a bigger footprint in the router and switch market with the next iteration of its top-line silicon, the StrataDNX line. While conceding that merchant silicon isn't going to push Cisco or Juniper Networks out of the network core where the biggest traffic flows exist, Broadcom reckons the ability to support beyond- …
Brocade logo

Brocade targets SDN planners in campus switch range refresh

Brocade has announced a new bunch of campus switches, and with them support for new software defined network (SDN) features and a nifty ability to mix different switches in the stack as if they were all the same kind. While the press release tries to grab the eye with stuff like port density and speeds-and-feeds, the Switch Port …

China's 'Deep Panda' crew targets Middle East policy wonks - report

A group of China-based cyber spies have begun targeting national security think tanks, initially targeting analysts focusing on the Asia-Pacific region before switching their focus to Iraq. Infosec threat intelligence firm CrowdStrike warns that a group it dubs Deep Panda has begun targeting think tanks, particularly those …
John Leyden, 08 Jul 2014
SAMLabs Internet of things kit

IoT coding kit targets experimenters who can't code

London startup SAMLabs reckons the Internet of Things is just like LegoTM – and has put together a combo of hardware breadboard and software programming environment to prove it. The Kickstarter-supported project combines designers and engineers from the Royal College of Art and Imperial College, London, working in Microsoft …

Android ransomware demands 12x more cash, targets English-speakers

Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove. The newest variant of Android/Simplocker displays the ransom note in English and asks for a higher ransom of $300. The latest version also encrypts a wider …
John Leyden, 23 Jul 2014

PRISM snitch claims NSA hacked Chinese targets since 2009

PRISM snitch Edward Snowden now claims to have data which proves the NSA has been hacking hundreds of civilian targets in China and Hong Kong since 2009. Public officials, businesses and students as well as the Chinese University of Hong Kong were among the targets in the former British colony, Snowden told the South China …
Phil Muncaster, 13 Jun 2013
Flag of Republic of China

'Honker Union' sniffs 270 hacktivism targets

Infamous Chinese hacktivist group Honker Union has shortlisted a whopping 270 Japanese targets for attack today - the anniversary of the Manchurian Incident, which was the precursor to the Japanese invasion of China. The group singled out Japan’s Ministry of Foreign Affairs, the Prime Minister’s Office and other ministries, …
Phil Muncaster, 18 Sep 2013
Burning copyright symbol. Photo by: Martin Fisch http://www.flickr.com/photos/marfis75/ on flickr"

Recording lawsuit targets Ford, GM in-car CD recorders

The recording industry has spotted another potential target of tax-by-lawsuit: the auto industry, for in-car media players. In a complaint available at Scribd, the Alliance of Artists and Recording Companies (AARC) names General Motors, Ford, and component suppliers Denso and Clarion as supplying recorders that don't comply with …
Thing

Teeny GPU targets wearables, Things

This GPU isn't going to get Bitcoin enthusiasts worked up, but from a “wow that's small” point of view it's interesting: Vivante is shipping a range of GPUs that ranges from 0.3 mm2 up to 1.6 mm2 in size for IoT and wearables applications. The four devices the company's announced include two VGA/WVGA devices (the 100-200 MHz GC …

Fiendish Internet Explorer 10 zero-day targets US soldiers

Cyberspies have used an unpatched vulnerability in Internet Explorer 10 in an exploit which appears to target US military personnel. Among three high-priority updates in the most recent Patch Tuesday (11 February) was a cumulative fix for Explorer which addressed a whopping two dozen different memory corruption vulnerabilities …
John Leyden, 14 Feb 2014
Oracle Sparc T4 chip

Oracle targets Windows workloads with virtualisation manager update

Oracle VM has received an upgrade that makes the free tool better at managing Windows virtual machines and handling SPARC workloads. Oracle's VM Server for x86 is free, but Big O isn't exactly throwing the kitchen sink at the product as evidenced by the fact it this week it released version 3.3, more than two years after January …
Simon Sharwood, 04 Jul 2014

Derelict TrueCrypt Russia portal 'is command hub for Ukraine spying op'

Malware used to attack Ukrainian government, military, and major news agencies in the country, was distributed from the Russian portal of encryption utility TrueCrypt, new research has revealed. Security peeps at ESET discovered a connection to a Russian version of the now discontinued popular source-is-available encryption …
John Leyden, 30 Jul 2015
Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Australia targets software maintenance costs with Drupal plan

Software maintenance costs Australia's government will today hand down its annual budget, a document that is expected to result in the closure and/or merger of around 70 government agencies as part of an austerity drive designed to reduce government debt. Those left standing after the resulting “machinery of government changes …
Simon Sharwood, 13 May 2014

Cyberspies blast Icefog into US targets' backdoors

Miscreants behind a cyberespionage campaign have changed their methods to take advantage of Java-based malware. The Icefog APT (advanced persistent threat), discovered in September 2013, continues to be a problem, this time utilising a Java backdoor, according to the latest analysis of the threat by security researchers at …
John Leyden, 15 Jan 2014

GCX targets small cloud players with new cable

Global Cloud Xchange – formerly Reliance Globalcomm – has announced plans for a new submarine cable joining Tokyo to Silicon Valley. Along the way, the outfit also says it hopes to create a new model for access to submarine assets, by attaching its own meet-me rooms to the cable, rather than restricting access to large players …
Blackmail

Bitcoin blackmail gang start hurling DDoSes at Scandinavia

Bitcoin extortionists DD4BC have begun targeting Scandinavian companies with complex DDoS attacks. DD4BC is blackmailing targets by asking them to pay 40 bitcoins or more to avoid their central services being subject to DDoS attacks. Extortionate demands typically appear in emails around an hour after targets are blitzed off the …
John Leyden, 09 Jun 2015
HPApollo8000

HP targets supercomputers with Project Apollo

HP is imprisoning powerful Intel Xeons inside water-cooled cages ... for science! The company announced on Monday that it has developed two new classes of server for high-performance computing workloads as it prepares to go against traditional supercomputer makers like Cray, Fujitsu, IBM, SGI, and others for the lucrative high- …
Jack Clark, 10 Jun 2014
Bitcoin bloodbath

Pony up: Botnet succesfully targets Bitcoin

Another $US200,000-plus worth of Bitcoins has been lifted, according to Trustwave, which has identified a new Pony botnet targeting crypto-currencies. News of the heist comes hard on the heels of Mt Gox withdrawing from the Bitcoin foundation and killing off its social media accounts. Pony isn't a horse of a completely …
Angela Merkel. Pic: Christliches Medienmagazin

NSA snooped on German chancellors for DECADES: Wikileaks

Less than a month after Germany abandoned its probe into alleged NSA spying on Chancellor Angela Merkel, a new Wikileaks drop suggests snooping on the Chancellory goes back decades. The leak, published here, draws the inference that prior chancellors were targeted, based on the list of telephone numbers targeted by the NSA. “ …
Free BSD Logo

FreeBSD 10.0 lands, targets VMs and laptops

The tenth version of the open source operating system FreeBSD has emerged. In true community style the software has emerged before the software's plan called for its announcement to be made public. Alphas of the new release have been available for about six months now and the final release seems not to diverge much form those …
Simon Sharwood, 20 Jan 2014

Thanks for open sourcing .NET say Point of Sale villains

Trend Micro researcher Jay Yaneza says Point of Sales malware has begun using Microsoft .NET, following its release as open source last year. Yaneza found the new so-called GamaPoS malware being distributed to US organisations including credit unions, developers, and pet care businesses through the resurgent Andromeda botnet. …
Darren Pauli, 17 Jul 2015

Password-flogging phishing tool pwns EVERY iOS Mail app

Ernst and Young forensic bod Jan Soucek has created a tool capable of generating slick iCloud password phishing emails he says exploits an unpatched bug affecting millions of Apple users. The researcher created the iOS 8.3 Mail.app inject kit which exploits a bug in the operating system's native email client to produce a …
Darren Pauli, 10 Jun 2015
Xpliant chip

Xpliant targets white-label Ethernet switch vendors with shiny new silicon

Ethernet silicon vendor Xpliant – currently being digested by Cavium in an acquisition due to conclude in 2015 – is hoping to knock Broadcom out of its spot at the heart of the Ethernet switch market. The upstart, launched in 2011, says it'll have sample silicon in Q4 2014 for an architecture designed to combine speed and …

Iranian CLEAVER hackers may DRAIN energy and defence firms, warn Feds

Iranian hackers may be sniffing out education, defence and energy targets as part of a well-planned operation, the US Federal Bureau of Investigation has reportedly warned. A secret FBI document dubbed "Flash, seen by Reuters, offered advice to businesses on how to foil any such attacks. It comes after Cylance researchers …
Kelly Fiveash, 14 Dec 2014
Ghost Recon: Future Soldier

Samsung targets South Korean army recruits

Electronics giant Samsung has enlisted the help of an unusual ally in its on-going recruitment efforts: the South Korean army. The country’s pre-eminent chaebol has agreed to pick 100 soldiers from a shortlist of 150 for a four month software training program, it told the Wall Street Journal. Anyone who has graduated from high …
Phil Muncaster, 15 Jan 2014

Israeli gov & boffins targeted by pr0ntastic malware from Gaza

Hackers from Gaza and Egypt appear to have teamed up in order to attack Israeli government, research, infrastructure and military networks. Security researchers at Trend Micro have traced ongoing malware-based attacks against Israeli organisations back to Gaza. Trend have uncovered two separate, but interconnected campaigns. …
John Leyden, 16 Feb 2015
The Register breaking news

Open source cellular targets rural comms

Start-up RangeNetworks is hoping that the combination of low cost and transparent software will allow it to break into the notoriously locked-down cellular network market. Mobile network infrastructure is traditionally the preserve either of either established vendors (think Ericsson or Alcatel-Lucent), or well-backed new …

Apple and MS attackers Wild Neutron return with fresh run of attacks

Hackers linked to attacks against Apple, Microsoft, Twitter and Facebook in early 2013 are back in business, with a fresh run of ongoing attacks against a more diverse and extensive range of businesses over recent months. The so-called Wild Neutron hacking crew have attacked law firms, Bitcoin-related companies, investment …
John Leyden, 08 Jul 2015
Quantum_Artico_Arkivio

Quantum makes the leap into money-saving archiving

Quantum has added another layer to the onion that is its StorNext file management and archiving product set. It now has Arkivo software selecting primary storage files on a policy basis. It sends them for archiving either to a DXi deduped backup target, with an archiving partition, or to a new device, an Artico near-line NAS …
Chris Mellor, 09 Apr 2015
SAP co-CEO Bill McDermott

SAP: Those growth targets we talked about? Give us another 2 years

SAP has delayed its 2015 growth goal by two years because of an uptick in cloud and software maintenance at the expense of its core business. The world’s largest maker of business software Tuesday announced final full year and fourth-quarter results in line with last week's preliminary numbers. But SAP did reveal its target of …
Gavin Clarke, 21 Jan 2014
A Handful of Giant Weta by Mike Locke

Ubuntu defibrillates 14.10 for one LAST patch

Ubuntu has changed its mind on an end-of-life announcement, giving Version 14.10 one last kernel patch to cover off some big vulns. Usually, end-of-life means what it says: a version isn't going to get any more updates, and that was the status of Ubuntu 14.10 “Utopic Unicorn” (guys, it's time to rethink your naming conventions …

Calling all cybercrooks: Ready-made phone attack rig for sale

Cybercrooks are marketing a hardware-based tool for running denial of service attacks on telephone systems. The Telephone Denial of Service attacks (TDoS) rig is being sold by a group of cybercriminals called “TNT” from Eastern Europe via underground cybercrime forums. The tool, called “TNT Instant Up”, features a special …
John Leyden, 23 Feb 2015

LinkedIn ices over bountiful executive phishing spot

Kaspersky researcher Ido Naor says LinkedIn users could be phished thanks to vulnerabilities in its notification system. The since-patched flaws existed because the social network for suits misinterpreted and did not properly validate comment input. It meant malicious content could be sent to LinkedIn users who are notified …
Darren Pauli, 24 Jul 2015

NSA raided hackers' troves of stolen data: report

The NSA and its allies have raided the pockets of independent and nation-state hackers and monitored some of the security industry's foremost researchers in its bid to hoover information on targets and find better ways to break systems, Snowden documents reveal. Spooks would monitor the work of 'freelance' and rival state …
Darren Pauli, 05 Feb 2015
Laser weapon aboard USS Ponce

US Navy's LASER CANNON WARSHIP: USS Ponce sent to Gulf

Pic and video After years of promises the US Navy has deployed its first operational laser cannon, which has been built into the USS Ponce and sent into a combat zone. The 30-kilowatt laser weapon system (LaWS) has been mounted high up on Ponce's superstructure, and a flashy video released by the Navy shows it blowing up parts of boats and a …
Iain Thomson, 11 Dec 2014
Credit: RodWey2004 Licence: https://creativecommons.org/licenses/by-sa/2.0/deed.en

Hawking, Musk, Woz (and Riley): ROBOTS will KILL US ALL

+Comment Notables of the technology world including physicist Stephen Hawking, biz baron Elon Musk and techno-hippy Steve Wozniak have teamed up with saucy actress minx Talulah Riley to warn us all about the menace of killer robots. In an open letter and petition, the distinguished trio and their co-signatories warn: Autonomous …
Lewis Page, 27 Jul 2015