Articles about Targets

Juniper targets LTE deployments with carrier switches

Juniper has opened the gate to let a couple of carrier routers out of the cage, along with enhancements to its Junos Space network management system. The two devices – the ACX500 and ACX5000 – target mobile backbone networks. The ACX500 is designed for routing traffic from small scale base stations, with system throughput of 6 …

POS malware crooks hack IP cams to validate targets

Carders operating the BackOff point of sales malware are hacking IP cameras to make sure their targets are worth attacking, says researcher Rotem Kerner says. The research plugs a "critical" gap in a July disclosure by the US CERT, which warned the popular carder malware was being flung at businesses using remote desktop …
Darren Pauli, 24 Dec 2014

New EU data chief: 'We share common targets with the United States'

After failing to impress the European Parliament in her grilling last week, the new Commissioner responsible for data protection has further explained her position on agreements with the US and data protection. Asked whether she would suspend the Safe Harbour data sharing agreement with the United States, Věra Jourová said that …
Jennifer Baker, 06 Oct 2014
Clouds in blue sky

Citrix targets carriers with NetScaler

MWC 2015 Citrix is taking a leap into carrier-grade network function virtualisation (NFV) with a new release of its NetScaler platform. Let's take the numbers first: the two rack unit NetScaler MPX 25000 series is a 160 gigabit-per-second appliance. Citrix says it lets operators crank up the data plane of their SGi-LAN to 3.5 Tbps. The …
Sony smartband talk

Will hottest CES gadgets be HOT TARGETS for hackers?

This year, more than any other, personal technology dominated the conversation at consumer electronics shindig CES. Wearable and mobile technology was showcased at the expo, and many vendors touted the width and breadth of data collected and managed by these devices, What, then, is going to keep hackers from lifting all that …
Shaun Nichols, 09 Jan 2015
Flag of Israel; credit James Emery

Snowden latest: NSA targets Gaza, pumps intelligence to Israel

According to the latest drop of leaks from NSA whistleblower Edward Snowden, the US spy agency provides financial assistance, weapons and signals intelligence to Israel. The Intercept reports that Canadian, British and Jordanian signals intelligence is also shared with Israel. This intelligence relates to Palestinian targets, …
John Leyden, 04 Aug 2014

Cisco targets India with new investment

In a move interpreted as an endorsement of the new Indian government headed by reformer, and digital service delivery believer, Narendra Modi, Cisco wants to turn around its fortunes in India, and is reportedly putting US$1.7 billion on the table as part of its strategy. The Economic Times reports the commitment, which The Borg …

China's 'Deep Panda' crew targets Middle East policy wonks - report

A group of China-based cyber spies have begun targeting national security think tanks, initially targeting analysts focusing on the Asia-Pacific region before switching their focus to Iraq. Infosec threat intelligence firm CrowdStrike warns that a group it dubs Deep Panda has begun targeting think tanks, particularly those …
John Leyden, 08 Jul 2014
SAMLabs Internet of things kit

IoT coding kit targets experimenters who can't code

London startup SAMLabs reckons the Internet of Things is just like LegoTM – and has put together a combo of hardware breadboard and software programming environment to prove it. The Kickstarter-supported project combines designers and engineers from the Royal College of Art and Imperial College, London, working in Microsoft …

Android ransomware demands 12x more cash, targets English-speakers

Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove. The newest variant of Android/Simplocker displays the ransom note in English and asks for a higher ransom of $300. The latest version also encrypts a wider …
John Leyden, 23 Jul 2014
Burning copyright symbol. Photo by: Martin Fisch http://www.flickr.com/photos/marfis75/ on flickr"

Recording lawsuit targets Ford, GM in-car CD recorders

The recording industry has spotted another potential target of tax-by-lawsuit: the auto industry, for in-car media players. In a complaint available at Scribd, the Alliance of Artists and Recording Companies (AARC) names General Motors, Ford, and component suppliers Denso and Clarion as supplying recorders that don't comply with …
Thing

Teeny GPU targets wearables, Things

This GPU isn't going to get Bitcoin enthusiasts worked up, but from a “wow that's small” point of view it's interesting: Vivante is shipping a range of GPUs that ranges from 0.3 mm2 up to 1.6 mm2 in size for IoT and wearables applications. The four devices the company's announced include two VGA/WVGA devices (the 100-200 MHz GC …
Flag of Republic of China

'Honker Union' sniffs 270 hacktivism targets

Infamous Chinese hacktivist group Honker Union has shortlisted a whopping 270 Japanese targets for attack today - the anniversary of the Manchurian Incident, which was the precursor to the Japanese invasion of China. The group singled out Japan’s Ministry of Foreign Affairs, the Prime Minister’s Office and other ministries, …
Phil Muncaster, 18 Sep 2013

PRISM snitch claims NSA hacked Chinese targets since 2009

PRISM snitch Edward Snowden now claims to have data which proves the NSA has been hacking hundreds of civilian targets in China and Hong Kong since 2009. Public officials, businesses and students as well as the Chinese University of Hong Kong were among the targets in the former British colony, Snowden told the South China …
Phil Muncaster, 13 Jun 2013

Fiendish Internet Explorer 10 zero-day targets US soldiers

Cyberspies have used an unpatched vulnerability in Internet Explorer 10 in an exploit which appears to target US military personnel. Among three high-priority updates in the most recent Patch Tuesday (11 February) was a cumulative fix for Explorer which addressed a whopping two dozen different memory corruption vulnerabilities …
John Leyden, 14 Feb 2014
Oracle Sparc T4 chip

Oracle targets Windows workloads with virtualisation manager update

Oracle VM has received an upgrade that makes the free tool better at managing Windows virtual machines and handling SPARC workloads. Oracle's VM Server for x86 is free, but Big O isn't exactly throwing the kitchen sink at the product as evidenced by the fact it this week it released version 3.3, more than two years after January …
Simon Sharwood, 04 Jul 2014
Parliament House Canberra by Flickr user OzMark17 used under CC Share and Share alike licence

Australia targets software maintenance costs with Drupal plan

Software maintenance costs Australia's government will today hand down its annual budget, a document that is expected to result in the closure and/or merger of around 70 government agencies as part of an austerity drive designed to reduce government debt. Those left standing after the resulting “machinery of government changes …
Simon Sharwood, 13 May 2014

Cyberspies blast Icefog into US targets' backdoors

Miscreants behind a cyberespionage campaign have changed their methods to take advantage of Java-based malware. The Icefog APT (advanced persistent threat), discovered in September 2013, continues to be a problem, this time utilising a Java backdoor, according to the latest analysis of the threat by security researchers at …
John Leyden, 15 Jan 2014

GCX targets small cloud players with new cable

Global Cloud Xchange – formerly Reliance Globalcomm – has announced plans for a new submarine cable joining Tokyo to Silicon Valley. Along the way, the outfit also says it hopes to create a new model for access to submarine assets, by attaching its own meet-me rooms to the cable, rather than restricting access to large players …
HPApollo8000

HP targets supercomputers with Project Apollo

HP is imprisoning powerful Intel Xeons inside water-cooled cages ... for science! The company announced on Monday that it has developed two new classes of server for high-performance computing workloads as it prepares to go against traditional supercomputer makers like Cray, Fujitsu, IBM, SGI, and others for the lucrative high- …
Jack Clark, 10 Jun 2014
Bitcoin bloodbath

Pony up: Botnet succesfully targets Bitcoin

Another $US200,000-plus worth of Bitcoins has been lifted, according to Trustwave, which has identified a new Pony botnet targeting crypto-currencies. News of the heist comes hard on the heels of Mt Gox withdrawing from the Bitcoin foundation and killing off its social media accounts. Pony isn't a horse of a completely …

Iranian CLEAVER hackers may DRAIN energy and defence firms, warn Feds

Iranian hackers may be sniffing out education, defence and energy targets as part of a well-planned operation, the US Federal Bureau of Investigation has reportedly warned. A secret FBI document dubbed "Flash, seen by Reuters, offered advice to businesses on how to foil any such attacks. It comes after Cylance researchers …
Kelly Fiveash, 14 Dec 2014
Xpliant chip

Xpliant targets white-label Ethernet switch vendors with shiny new silicon

Ethernet silicon vendor Xpliant – currently being digested by Cavium in an acquisition due to conclude in 2015 – is hoping to knock Broadcom out of its spot at the heart of the Ethernet switch market. The upstart, launched in 2011, says it'll have sample silicon in Q4 2014 for an architecture designed to combine speed and …

Israeli gov & boffins targeted by pr0ntastic malware from Gaza

Hackers from Gaza and Egypt appear to have teamed up in order to attack Israeli government, research, infrastructure and military networks. Security researchers at Trend Micro have traced ongoing malware-based attacks against Israeli organisations back to Gaza. Trend have uncovered two separate, but interconnected campaigns. …
John Leyden, 16 Feb 2015
Free BSD Logo

FreeBSD 10.0 lands, targets VMs and laptops

The tenth version of the open source operating system FreeBSD has emerged. In true community style the software has emerged before the software's plan called for its announcement to be made public. Alphas of the new release have been available for about six months now and the final release seems not to diverge much form those …
Simon Sharwood, 20 Jan 2014
Ghost Recon: Future Soldier

Samsung targets South Korean army recruits

Electronics giant Samsung has enlisted the help of an unusual ally in its on-going recruitment efforts: the South Korean army. The country’s pre-eminent chaebol has agreed to pick 100 soldiers from a shortlist of 150 for a four month software training program, it told the Wall Street Journal. Anyone who has graduated from high …
Phil Muncaster, 15 Jan 2014

Calling all cybercrooks: Ready-made phone attack rig for sale

Cybercrooks are marketing a hardware-based tool for running denial of service attacks on telephone systems. The Telephone Denial of Service attacks (TDoS) rig is being sold by a group of cybercriminals called “TNT” from Eastern Europe via underground cybercrime forums. The tool, called “TNT Instant Up”, features a special …
John Leyden, 23 Feb 2015
The Register breaking news

Open source cellular targets rural comms

Start-up RangeNetworks is hoping that the combination of low cost and transparent software will allow it to break into the notoriously locked-down cellular network market. Mobile network infrastructure is traditionally the preserve either of either established vendors (think Ericsson or Alcatel-Lucent), or well-backed new …

NSA raided hackers' troves of stolen data: report

The NSA and its allies have raided the pockets of independent and nation-state hackers and monitored some of the security industry's foremost researchers in its bid to hoover information on targets and find better ways to break systems, Snowden documents reveal. Spooks would monitor the work of 'freelance' and rival state …
Darren Pauli, 05 Feb 2015

CommBank app leaks 2FA tokens says Sydney dev

Sydney programmer Stuart Ryan has chipped Australia's dominant retail bank, the Commonwealth Bank, for allowing two factor authentication codes to be viewable on locked iPhones. The bank sends authentication tokens over push notifications on iOS devices, rather than SMS for users who had activated the second factor account log …
Darren Pauli, 12 Feb 2015
Laser weapon aboard USS Ponce

US Navy's LASER CANNON WARSHIP: USS Ponce sent to Gulf

Pic and video After years of promises the US Navy has deployed its first operational laser cannon, which has been built into the USS Ponce and sent into a combat zone. The 30-kilowatt laser weapon system (LaWS) has been mounted high up on Ponce's superstructure, and a flashy video released by the Navy shows it blowing up parts of boats and a …
Iain Thomson, 11 Dec 2014
SAP co-CEO Bill McDermott

SAP: Those growth targets we talked about? Give us another 2 years

SAP has delayed its 2015 growth goal by two years because of an uptick in cloud and software maintenance at the expense of its core business. The world’s largest maker of business software Tuesday announced final full year and fourth-quarter results in line with last week's preliminary numbers. But SAP did reveal its target of …
Gavin Clarke, 21 Jan 2014
Artist's rendering of the concave Vdara hotel

Feeling safe in your executive hotel suite, Mr CEO? Well, DON'T

Corporate bosses are coming under attack from a shadowy new group that spreads malware by hijacking the networks of luxury hotels. Kaspersky Labs' Global Research & Analysis Team has issued a warning about an advanced persistent threat designed by a crew called Darkhotel, who target top execs as they relax in plush hotel rooms …
Jasper Hamill, 10 Nov 2014
The Pirate Bay's new IsoHunt logo

IsoHunt releases roll-your-own Pirate Bay

Torrent site ISOhunt has created a roll-your-own, open source, version of infamous file-sharing site The Pirate Bay. IsoHunt's motive for the release seems to be a belief that big targets like The Pirate Bay will inevitably be picked off by law enforcement agencies. Lots of sites, however, present a tougher target. Open-sourcing …
Simon Sharwood, 22 Dec 2014

Mellanox targets Fibre Channel with 56 Gbps FDR InfiniBand

Mellanox is confidently predicting the slow death of Fibre Channel, as it rips the wrapping paper off a 56 Gbps FDR InfiniBand solution it says offers ten times faster live migration of Windows Server 2012 R2 virtual machines. Marketing VP Kevin Deierling believes the march of RDMA-enabled Ethernet and InfiniBand systems, along …
IBM Dynamic Buy

IBM continues fanboi courtship with fresh crop of iOS apps

IBM has released a trio of enterprise applications for iOS devices, as part of its Businesslab partnership with Apple. Big Blue's three new iOS apps offer tools for customer service tasks and remote working, two areas that IBM and Apple cited as keys last year when they announced their joint effort to put IBM business software …
Shaun Nichols, 03 Mar 2015

Fukushima fearmongers: It's YOUR FAULT Japan DUMPED CO2 targets

Comment If the Fukushima crisis has proved one thing, it's that nuclear power is safe. Everything that could possibly go wrong did, the accident was agreed to be at the top of the international scale for seriousness, and yet in decades to come scientists will not be able to attribute any deaths to radiation released from the Daiichi …
Lewis Page, 15 Nov 2013
Sony XDR-S16DBP digital radio

Blighty's great digital radio switchover targets missed AGAIN

The digital radio revolution is taking place regardless of the uptake of DAB, according to Ofcom's annual digital radio report (PDF). Home penetration of DAB receivers has still not reached 50 per cent and sales of DAB receivers in Britain – including car audio systems – has fallen from 2.2 million in Q1 2008 to 1.9 million in …
Andrew Orlowski, 26 Sep 2013

BSA targets Indonesian pirates

In a sign of Indonesia’s increasing importance as a market for Western technology vendors, anti-piracy body the Business Software Alliance has teamed up with local police to bust numerous firms found to be running illegal copies of well-known software. The raid on 20 businesses back in March yielded pirated software from …
Phil Muncaster, 14 May 2013

'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described

A highly advanced malware instance said to be as sophisticated as the famous Stuxnet and Duqu has has been detected. "Regin" has security researchers opining it may be nastier than both. "Regin" malware is thought to have been developed by a nation-state because of the financial clout needed to produce code of this complexity. …
Darren Pauli, 24 Nov 2014

Privacy bods Detekt Hacking Team code nasty dressed as bookmark manager

The Detekt privacy tool has discovered Hacking Team's Windows spyware masquerading as a benign bookmark manager. Detekt was launched last week and offers users of Windows systems to inspect their machines for traces of known government spyware. Developer Claudio Guarnieri said on Twitter the tool discovered the malicious …
Darren Pauli, 26 Nov 2014
Babar the Elephant. Pic: Brendan Adkins

Babar the Elephant: Another malware plague with a cute name

A strain of French-language cyber-espionage malware spotted by infosec researchers shows that the NSA aren't the only spook agency brewing custom nasties to steal sensitive data. Babar was first mentioned in documents from Canadian intel agency CSEC (Communications Security Establishment Canada) leaked by Edward Snowden. They …
John Leyden, 19 Feb 2015

Yahoo! Slurps! Indian! Google! Docs! Lookalike!

Yahoo! has picked up Bangalore company Bookpad in a deal described as strengthening the Yahoo! Mail service. Bookpad is responsible for a service called Docspad, an online file editing operation, which would give the Purple Palace a little bit of the kind of functionality people have learned to expect from competitors like Gmail …
ISIS leader Shakir Wahiyib with Facebook thumbs-up

Pro-ISIS script kiddies deface West Yorkshire egg-chasers' site

Pro-ISIS script kiddies defaced the website of Rugby League team the Keighley Cougars over the weekend in the latest of a series of attacks against somewhat obscure targets. The West Yorkshire club's home page was replaced by a black screen and the message: "I love you Isis" with the tag "Hacked By Team System DZ" at the top of …
John Leyden, 03 Nov 2014
Implementing SDN - difficult choices

SK Tel, Cisco sign with ON.Labs

SK Telecom reckons software-defined networking (SDN) is going to be the Way of The FutureTM and has signed up as a member of the ON.Lab open source project. ON.Lab is an open source SDN platform that targets the carrier market, integrating a network operating system (Onos), network hypervisor (OVX), virtual network development …
pyramidinvestnorthafrica

The ULTIMATE CRUELTY: Sandworm uses PowerPoint against Swiss bank customers

The Sandworm vulnerability is being actively abused to attack Swiss banking customers, Danish security consultancy CSIS has warned. CSIS reports that the attacks are pushing the latest version of the Dyre banking trojan. Attacks arrive as spam emails under the guise of information about unpaid invoices. In reality the …
John Leyden, 30 Oct 2014

DeputyDog attack targets latest IE zero day

Security researchers have spotted two new targeted attack campaigns aimed at organisations in Japan, China and elsewhere in Asia, one of which exploits a zero day exploit in Internet Explorer revealed only last week. Operation DeputyDog is targeted at “entities in Japan”, using the IE vulnerability CVE-2013-3893 which Microsoft …
Phil Muncaster, 23 Sep 2013

Zero-day hacking group resorts to UNICORN SMUT-SLINGING

Sysadmins who have not yet patched their Windows boxes against the 18-year-old "unicorn-like" OLE bug disclosed last month could expect a deluge of spear phishing smut from a group once confined to lofty targeted zero-day attacks. The talented APT3 group was behind widespread zero-day attacks code-named Clandestine Fox earlier …
Darren Pauli, 26 Nov 2014

Juniper okays Elliott Management's board nominees

Juniper Networks and activist investor Elliott Management are fluttering the “peace in our time” paper, with the network ironmonger agreeing to appoint two new Elliot-approved directors to its board. The deal will hopefully give the company some respite from a year of corporate turbulence that saw the appointment and axing of a …
Bitcoin system would kill mammoth mining pools

Fifteen countries KO'd in malware one-two punch

Someone suspected to be backed by a nation state is attacking embassies of former soviet states with a malware tool that has infiltrated networks across more than 15 countries. Hacked embassies of unnamed former soviet states include those located in: France; Belgium; Ukraine; China; Jordan; Greece; Kazakhstan; Armenia; Poland, …
Darren Pauli, 12 Aug 2014