Feeds

Articles about Targets

Flag of Republic of China

'Honker Union' sniffs 270 hacktivism targets

Infamous Chinese hacktivist group Honker Union has shortlisted a whopping 270 Japanese targets for attack today - the anniversary of the Manchurian Incident, which was the precursor to the Japanese invasion of China. The group singled out Japan’s Ministry of Foreign Affairs, the Prime Minister’s Office and other ministries, …
Phil Muncaster, 18 Sep 2013

Fiendish Internet Explorer 10 zero-day targets US soldiers

Cyberspies have used an unpatched vulnerability in Internet Explorer 10 in an exploit which appears to target US military personnel. Among three high-priority updates in the most recent Patch Tuesday (11 February) was a cumulative fix for Explorer which addressed a whopping two dozen different memory corruption vulnerabilities …
John Leyden, 14 Feb 2014

PRISM snitch claims NSA hacked Chinese targets since 2009

PRISM snitch Edward Snowden now claims to have data which proves the NSA has been hacking hundreds of civilian targets in China and Hong Kong since 2009. Public officials, businesses and students as well as the Chinese University of Hong Kong were among the targets in the former British colony, Snowden told the South China …
Phil Muncaster, 13 Jun 2013

GCX targets small cloud players with new cable

Global Cloud Xchange – formerly Reliance Globalcomm – has announced plans for a new submarine cable joining Tokyo to Silicon Valley. Along the way, the outfit also says it hopes to create a new model for access to submarine assets, by attaching its own meet-me rooms to the cable, rather than restricting access to large players …

Cyberspies blast Icefog into US targets' backdoors

Miscreants behind a cyberespionage campaign have changed their methods to take advantage of Java-based malware. The Icefog APT (advanced persistent threat), discovered in September 2013, continues to be a problem, this time utilising a Java backdoor, according to the latest analysis of the threat by security researchers at …
John Leyden, 15 Jan 2014
Bitcoin bloodbath

Pony up: Botnet succesfully targets Bitcoin

Another $US200,000-plus worth of Bitcoins has been lifted, according to Trustwave, which has identified a new Pony botnet targeting crypto-currencies. News of the heist comes hard on the heels of Mt Gox withdrawing from the Bitcoin foundation and killing off its social media accounts. Pony isn't a horse of a completely …
Free BSD Logo

FreeBSD 10.0 lands, targets VMs and laptops

The tenth version of the open source operating system FreeBSD has emerged. In true community style the software has emerged before the software's plan called for its announcement to be made public. Alphas of the new release have been available for about six months now and the final release seems not to diverge much form those …
Simon Sharwood, 20 Jan 2014
Ghost Recon: Future Soldier

Samsung targets South Korean army recruits

Electronics giant Samsung has enlisted the help of an unusual ally in its on-going recruitment efforts: the South Korean army. The country’s pre-eminent chaebol has agreed to pick 100 soldiers from a shortlist of 150 for a four month software training program, it told the Wall Street Journal. Anyone who has graduated from high …
Phil Muncaster, 15 Jan 2014
SAP co-CEO Bill McDermott

SAP: Those growth targets we talked about? Give us another 2 years

SAP has delayed its 2015 growth goal by two years because of an uptick in cloud and software maintenance at the expense of its core business. The world’s largest maker of business software Tuesday announced final full year and fourth-quarter results in line with last week's preliminary numbers. But SAP did reveal its target of …
Gavin Clarke, 21 Jan 2014
The Register breaking news

Open source cellular targets rural comms

Start-up RangeNetworks is hoping that the combination of low cost and transparent software will allow it to break into the notoriously locked-down cellular network market. Mobile network infrastructure is traditionally the preserve either of either established vendors (think Ericsson or Alcatel-Lucent), or well-backed new …

Fukushima fearmongers: It's YOUR FAULT Japan DUMPED CO2 targets

If the Fukushima crisis has proved one thing, it's that nuclear power is safe. Everything that could possibly go wrong did, the accident was agreed to be at the top of the international scale for seriousness, and yet in decades to come scientists will not be able to attribute any deaths to radiation released from the Daiichi …
Lewis Page, 15 Nov 2013

Mellanox targets Fibre Channel with 56 Gbps FDR InfiniBand

Mellanox is confidently predicting the slow death of Fibre Channel, as it rips the wrapping paper off a 56 Gbps FDR InfiniBand solution it says offers ten times faster live migration of Windows Server 2012 R2 virtual machines. Marketing VP Kevin Deierling believes the march of RDMA-enabled Ethernet and InfiniBand systems, along …
Sony XDR-S16DBP digital radio

Blighty's great digital radio switchover targets missed AGAIN

The digital radio revolution is taking place regardless of the uptake of DAB, according to Ofcom's annual digital radio report (PDF). Home penetration of DAB receivers has still not reached 50 per cent and sales of DAB receivers in Britain – including car audio systems – has fallen from 2.2 million in Q1 2008 to 1.9 million in …
Andrew Orlowski, 26 Sep 2013

BSA targets Indonesian pirates

In a sign of Indonesia’s increasing importance as a market for Western technology vendors, anti-piracy body the Business Software Alliance has teamed up with local police to bust numerous firms found to be running illegal copies of well-known software. The raid on 20 businesses back in March yielded pirated software from …
Phil Muncaster, 14 May 2013

DeputyDog attack targets latest IE zero day

Security researchers have spotted two new targeted attack campaigns aimed at organisations in Japan, China and elsewhere in Asia, one of which exploits a zero day exploit in Internet Explorer revealed only last week. Operation DeputyDog is targeted at “entities in Japan”, using the IE vulnerability CVE-2013-3893 which Microsoft …
Phil Muncaster, 23 Sep 2013
Close Encounters

VMware's next network virtualisation targets: ELEPHANTS and MICE

VMware's software-defined networking (SDN) Daddy Martin Casado has likened the technique to the film “Close Encounters of the Third Kind”, not the meteor-headed-for-earth scenario of “Armageddon”. Speaking to The Register at vForum Australia, Casado said he likes the Close Encounters analogy because SDN is already here and …
Simon Sharwood, 22 Oct 2013

Serco throws US in the clink for wrecking cash targets

Outsourcing behemoth Serco missed its targets for the first half of this year as "challenging" US conditions weighed down revenue. The IT company, which runs prison services in Britain and air traffic centres around the world, was still hoping in May to achieve six per cent growth in sales year-on-year for the first half of 2012 …
gavel

Patent suit targets Formlabs and Kickstarter

As the world turns increasingly into one in which nobody can do anything without being sued by someone, 3D Systems is suing Formlabs and Kickstarter over alleged patent infringement covering 3D printing. Formlabs had pimped its project on Kickstarter, raising nearly $US3 million towards its aim of developing a low-cost 3D …
Samsung

Samsung targets pockets with latest Galaxy blower

Samsung sent its latest Android into orbit today, announcing the Galaxy Pocket, a low-end handset said to be geared towards those who use their phone on the move. Surely marketing can do better than that? The Samsung Galaxy Pocket packs a 2.8in, 240 x 320 display with 3GB of built-in storage that's expandable to 32GB using …
Caleb Cox, 06 Mar 2012
The Register breaking news

Operation Hunt the Hunter: Anonymous targets 'revenge porn' man

Hacktivist collective Anonymous has set its sights on the former owner of a "revenge porn" website. Hunter Moore gained internet infamy by posting sexually revealing images of men and women without their permission, alongside links to their social networking profiles. The images were normally submitted by aggrieved ex-boyfriends …
John Leyden, 04 Dec 2012

New York Times hackers linked to Japan Ichitaro attacks

Security experts have uncovered attacks exploiting a zero day vulnerability in Japan’s most popular word processing software, bearing all the hallmarks of a Chinese group blamed for last year's New York Times hack. Ichitaro developer, JustSystems, announced a remote code execution vulnerability in multiple versions of the …
Phil Muncaster, 18 Nov 2013
gavel_judgment_channel

Patent troll targets ZTE

Chinese telecoms kit maker ZTE was hit with more bad news on Monday when intellectual property firm Vringo announced it was suing the firm’s UK subsidiary over patent infringement. Vringo, which claims it has an IP portfolio of over 500 patents and patent applications in the telecoms space, said it had asked ZTE in September to …
Phil Muncaster, 09 Oct 2012
Anon

Anonymous tweets for hack targets

Hacktivist guild Anonymous has taken to Twitter to ask followers for tips on who the group should attack next. Still reeling over the arrest of Megaupload mogul Kim Dotcom, Anonymous posted the following tweet: Anon tweet After several people suggested the group throws punches at social network sites, it responded: “Lulz at …
Caleb Cox, 23 Jan 2012
Twitter girl

NSA spied on 'radicalisers' porn surfing so as to discredit them, reveals Snowden

The NSA spied on the porn-surfing habits of firebrand Muslims as part of a plan to discredit "radicalisers", it has emerged. A top-secret NSA document, leaked by fugitive whistleblower Edward Snowden, identifies six Muslim targets as examples of how personal proclivities determined through electronic surveillance can be used to …
John Leyden, 27 Nov 2013
Photo of Microsoft Surface Windows 8 Pro, with Touch Cover

Microsoft Surface ad targets preppy, Glee-watching youngsters

Is it an Apple advert, a commercial for insurance, or an episode of Glee? No, it’s the first Surface commercial from Microsoft. Hot on the heels of Microsoft’s Windows 8 ad – which seemed to bury the tablet and emphasise the traditional PC – Microsoft's latest ad flogs its own hardware: the Windows 8-based Surface. The ad is …
Gavin Clarke, 16 Oct 2012

EFF claims Vietnam targeted its staff with spear phishing attack

Advocacy group the Electronic Frontier Foundation (EFF) has warned of an uptick in targeted malware attacks by “state-aligned actors” in Vietnam against foreign activists and journalists. In a blog post this week the group complained of a new campaign targeting its own staff – the first of its kind. A suspicious looking email …
Phil Muncaster, 21 Jan 2014
The Register breaking news

Dexter malware targets point of sale systems worldwide

You could be getting more than you bargained for when you swipe your credit card this holiday shopping season, thanks to new malware that can skim credit card info from compromised point-of-sale (POS) systems. First spotted by security firm Seculert, the malware dubbed "Dexter" is believed to have infected hundreds of POS …
Neil McAllister, 14 Dec 2012
The Register breaking news

Holland slashes carbon targets, shuns wind for nuclear

In a radical change of policy, the Netherlands is reducing its targets for renewable energy and slashing the subsidies for wind and solar power. It's also given the green light for the country's first new nuclear power plants for almost 40 years. Why the change? Wind and solar subsidies are too expensive, the Financial Times …
Andrew Orlowski, 10 Feb 2011
management consumerisation

Vohkus hauls in former Kelway officer as COO

Kelway's former chief bean counter Craig Compton has bagged a seat on the board and keys to the COO's office at south coast-based reseller Vohkus. Compton left Kelway in the summer of 2011 after three and a half year stint during which the company hoovered up targets including Panacea, Repton and ISC Networks. The abacus …
Paul Kunert, 07 Oct 2013

When ZOMBIES attack: DDoS traffic triples as 20Gbps becomes the new normal

DDoS traffic has more than trebled since the start of 2013, according to a new study released on Thursday that fingers zombie networks as the primary source of junk traffic that can be used to flood websites. More than a quarter of all botnets are located in either India, China and Iran. The study, by DDoS mitigation firm …
John Leyden, 27 Mar 2014

Dell staffers head for exit armed with redundo cheques

The first wave of Dell folk to volunteer to leap from the privately owned biz with a redundancy parachute, swept over parts of the organisation last week – and by all accounts the numbers exceeded management targets. Or so say our sources close to the company, some of whom are now former Dell people that were only too happy to …
Paul Kunert, 12 Feb 2014
The Register breaking news

Mac-based Trojan targets Uyghur activists

Security researchers have intercepted a Mac-based Trojan attack targeting Uyghur human rights activists. The Uyghur are a minority ethnic group that live in Eastern and Central Asia, mostly (but not exclusively) within the geographical borders of China. A run of infected emails sent to Uyghur activists, and intercepted by …
John Leyden, 29 Jun 2012
management regulation2

Court allows EFF to keep donor list secret from patent troll

The Electronic Frontiers Foundation in America has won a smackdown against a patent troll that was demanding names of donors to a campaign against its patents. The battle began last year, when the EFF began a campaign against patents that Personal Audio has been using to try and take ownership of podcasting. Personal Audio has …

International Trade Commission heeds Moto, targets Apple

The IT industry’s ongoing battle to outlaw itself with intricately cross-linked patent-driven bans on device sales continues, with Google-owned Motorola Mobility winning an International Trade Commission investigation into Apple over yet more infringement. Back in August, the Chocolate Moto asked the ITC for the probe. At the …
Girl in rain

BT warned: Speed up Openreach repairs or face PUNITIVE FINES

BT's Openreach division has been repeatedly slammed by other telcos for failing to adequately fix faults in a timely manner - and now the UK's communications watchdog has waded in. Ofcom said this morning that it planned to impose new rules on BT that would force its Openreach engineers to "meet minimum performance standards" or …
Kelly Fiveash, 19 Dec 2013
The QF-16

F-16 fighter converted to drone

Kids aspiring to become fighter pilots just had their hopes and dreams crushed that little bit more, after Boeing successfully converted an F-16 Fighting Falcon into a pilot-less aircraft. The newly-designated QF-16 had been retired by the US Air Force before Boeing acquired it, restored it airworthy condition and rigged it up …
Simon Sharwood, 24 Sep 2013
Roaring lynx

Securo-boffins link HIRED GUN hackers to Aurora, Bit9 megahacks

Security researchers have linked the “Hackers for hire” Hidden Lynx Group with a number of high-profile attacks, including an assault on net security firm Bit9, as well as the notorious Operation Aurora assault against Google and other hi-tech firms back in 2009. Hidden Lynx is a sophisticated hacking group based in China and …
John Leyden, 17 Sep 2013
The Register breaking news

Girl gang targets Microsoft's Seattle stores for $5,000 theft spree

Seattle police are on the lookout for a group of female thieves who are targeting Microsoft retail stores on its home turf. The police report says that the gang, which consists of six women and a man, have so far stuck five times in the last two months, Q13 Fox reports. So far they've stolen an estimated $5,000 in purloined …
Iain Thomson, 11 Dec 2012
zombie_business_types

Yellow Pages targets zombie survivalist market

Australia’s Yellow Pages will hand out A$2500 to the developer whose app best assists users to survive a zombie invasion and/or apocalypse … with the aid of the popular business directory. The reason for the prize is the API that Sensis, publisher of the Yellow Pages in Australia, offers developers who wish to link to dredge …
Simon Sharwood, 15 May 2012
GCHQ road sign

Snowden documents show British digital spies use viruses and 'honey traps'

At the start of this week, documents released by whistleblower Edward Snowden detailed DDOS attacks on chatrooms by a British online intelligence unit dubbed the Joint Threat Research Intelligence Group (JTRIG). Now he has released a new trove showing that JTRIG is about much more than purely online annoyances. According to the …
Iain Thomson, 07 Feb 2014
Cisco Google screengrab

WebEx gets shiny Chromebook look

Cisco and Google have agreed to play nice in the enterprise, with the two deciding to collaborate to put the WebEx collaboration service on Chromebook machines. Cisco's Rowan Trollope, senior veep and general manager for the Collaboration Technology Group, made the announcement along with Google's Rajen Sheth at Enterprise …
Huawei Blaze

Huawei targets UK with sub-£100 smartphone

Huawei is finally ready to launch a presence of its own in the UK, bringing its promised sub-£100 smartphone to Blighty next month. Huawei Blaze Unfortunately, the Blaze is rather average, with its 3.2in, 320 x 480 display, 3.2Mp camera and 512MB of storage. This can be expanded by up to 32GB with Micro SD card. Blaze runs …
Caleb Cox, 21 Sep 2011
Vulture South NBN Logo

'Mixed tech' NBN needs a super-sized HFC net

Even to miss its original cost targets and 2016 deadline, the federal government's “mixed technology” National Broadband Network is going to require a significant expansion of the subscriber capacity of the country's HFC networks, the NBN strategic review has found. The report (PDF) shows that the new government's forecasting …
The Register breaking news

New 'Madi' cyber-espionage campaign targets Iran AND Israel

Security researchers have discovered a new cyber-espionage campaign targeting victims in the Middle East. Kaspersky Lab and Seculert identified more than 800 victims located in Iran, Israel, Afghanistan and elsewhere in the course of monitoring control servers associated with cyber/espionage operation over the last eight months …
John Leyden, 17 Jul 2012
Huawei campus Shenzhen

China demands answers from US after 'I spy on one little Huawei' report

China has demanded an explanation from the US government in the wake of NSA whistleblower Edward Snowden's latest leak, which claims that the agency was spying on telecoms firm Huawei. The US has repeatedly accused Huawei of being a risky bet for network contracts outside of China as it claims that the company is involved in …

GCHQ hijacked LinkedIn profiles to hack Belgian telecoms network – report

British spies intercepted LinkedIn profile pages and injected malware into them to ultimately infiltrate the networks of mobile operators and other telcos in Belgium. That's according to the latest round of documents leaked by master squealer Edward Snowden. German weekly Der Spiegel reported that when some engineers working at …
Kelly Fiveash, 11 Nov 2013

Oracle and Pluribus team up, flip the switch on Cisco SDN killer

Oracle has signed a technology access and development deal with startup Pluribus Networks to nibble away at Cisco's proprietary networking business. The database giant has announced the deal to develop and test "a number" of software-defined networking (SDN) technologies for OpenStack with Pluribus. Oracle said the fruits of …
Gavin Clarke, 10 Feb 2014
channel_teaser_exit

Hitachi Data Systems says UK boss Ball dropped it

Stephen Ball's relatively brief reign at the top of Hitachi Data Systems UK has come to an end, with company veterans Steve Murphy and Tony Reid baby-sitting the role until a permanent successor is found. Industry veteran Ball landed at HDS as regional veep and GM in June 2011, and later admitted the firm "lacked teeth" in its …
Paul Kunert, 03 Sep 2013
A fake tattoo on the leg of Canberra Raiders footballer Sandor Earl, sent by Huawei as an April Fool

US saves self from Huawei spying by spying on Huawei spying

Maybe this is why the US government is so certain Huawei is bad news: Snowdenistas at The New York Times and Der Spiegel have reported another communiqué from their source-in-exile – this time to the effect that the United States National Security Agency penetrated Chinese networking equipment vendor Huawei and monitored its …
Simon Sharwood, 23 Mar 2014

Google researcher says government hack attacks on journos on the rise

Most major news organisations are now the targets of state-sponsored attacks on their security, according to Google security researcher Shane Huntley. According to Reuters, Huntley told the Singapore Black Hat conference on March 28 that his research, conducted in partnership with Citizen Labs' Morgan Marquis-Boire, revealed …