Feeds

Articles about Utility

True Utility FlyEye 7 LED torch

True Utility FlyEye 7 LED torch

Daily product reviews in 140 characters. True Utility FlyEye 7 Pictures True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch
Tony Smith, 17 Jun 2011
The Register breaking news

Google shakes up US utility with green power tariff

Google is using its giant pile of money to try and change how utility companies work, so that more businesses can buy their power from renewable sources. As part of a $600m expansion of its North Carolina data center, Google's local utility provider Duke Energy has pledged to develop a renewable energy tariff for Google and …
Jack Clark, 19 Apr 2013
The Register breaking news

Here's the $4.99 utility that might just have saved Windows 8

Veteran software outfit Stardock has offered Microsoft an elegant way to escape its Windows 8 Metro Notro dilemma. With Windows 8, Redmond foisted a new and radical touchscreen-driven user interface on a desktop PC market that was already in a once-in-a-generation slump - and both consumer sales and enterprise interest have been …
Andrew Orlowski, 08 Mar 2013
The Register breaking news

CSC secures A$25m utility deal

Utility Powercor-CitiPower has awarded CSC a renewed five-year IT services contract worth AU$25m. CSC was the incumbent provider of IT services for Victoria's largest electricity distributor. The last time the contract was extended in 2006, the five-year contract was valued at $AU17.8m. The utility giant provides services to …
The Register breaking news

Water utility hackers destroy pump, expert says

Hackers destroyed a pump used by a US water utility after gaining unauthorized access to the industrial control system it used to operate its machinery, a computer security expert said. Joe Weiss, a managing partner for Applied Control Solutions, said the breach was most likely performed after the attackers hacked into the …
Dan Goodin, 17 Nov 2011
The Register breaking news

Trojan poses as skeleton key jailbreak utility

Miscreants have created a Trojan that poses as a rumoured jailbreak utility for the latest iPhones. A utility reportedly in development will allow users to run software of their choice on any Apple smartphone, even those running iOS 4.0.2 or iOS 4.1. The greenpois0n utility takes advantage of a security shortcoming in bootrom …
John Leyden, 22 Sep 2010

Mozilla and Facebook snip a further five per cent from all JPEGs

Just four months after loosing the mozjpeg encoder on a waiting world, Mozilla has updated it to version 2.0, at the same time announcing that Facebook is testing the new iteration. The Social NetworkTM has also slung Mozilla $US60,000 towards the development effort in anticipation of mozjpeg 3.0. Mozjpeg, first released in …
The Register breaking news

Australian utility evaluates EV charging kit

Queensland-based electricity utility Ergon Energy is seeking expressions of interest for companies to help it evaluate electric vehicle charging infrastructure. Earlier this month, US-based Portus announced that Ergon would run tests in the north Queensland city of Townsville to see how well Portus’s electric vehicle support …

ScaleXtreme adds patch management to cloudy utility belt

ScaleXtreme, the upstart cloud-based systems management tool maker that is taking on heavyweights like IBM, CA, HP, and BMC, is adding patch management to its utility belt. The company launched its Xpert cloud-based systems management tool last June, which can build images for physical and virtual servers as well as public …

You've heard of the internet, right? Well this here might just be the INTERCLOUD

Equinix has removed one of the most intractable stumbling blocks in cloud computing's evolution from a high-price, differentiated market into one of low-cost utilities – by making it trivial for customers to suck data out of one provider and pour it into another. The colocation provider announced its Cloud Exchange service on …
Jack Clark, 30 Apr 2014
The Register breaking news

Second water utility reportedly hit by hack attack

Images posted online suggest that hackers may have gained unauthorized access to computers controlling a second water treatment facility, a claim that raises additional concerns about of the security of the US's critical infrastructure. Five computer screenshots posted early Friday purport to show the user interface used to …
Dan Goodin, 18 Nov 2011

Sync'n'steal: Hackers brew Android-targeting Windows malware

Internet Igors have stitched together the first strain of Windows malware that can hop over and infect Android smartphones and tablets. The Droidpak mobile banking trojan exploits syncing between smartphones and Windows PCs to jump from a compromised PC onto an Android device. The Windows Trojan downloads a malicious .APK file …
John Leyden, 27 Jan 2014
Nvidia

ARM64 gets better GPU support in CUDA release

NVIDIA has launched the next upgrade to its parallel computing and programming platform, with CUDA 6.5 going live as a production release. The free download here puts 64-bit ARM platforms on a par with x86, by letting them take advantage of GPU acceleration. As NVIDIA claims in this blog, the combination of low-power ARM64 …

Govt control? Hah! It's IMPOSSIBLE to have a successful command economy

One of the perennials of the great economic debate is those who insist that if we centrally planned how the economy would run, it would all work much better than this messy competition, profit-and-loss and duplication-of-effort system we're stuck with at the moment. And it didn't all start with the Soviets. Back in late- …
Tim Worstall, 13 Aug 2014
Avast! Free Anti-virus utility

Antivirus firm Avast! takes down forums after breach

Antivirus firm Avast! has 'fessed up to a breach. The small upside is that the mess only impacts the company's forums. As the company's CEO Vincent Steckler has blogged “Less than 0.2% of our 200 million users were affected. No payment, license, or financial systems or other data was compromised.” Don't click away to another …
Simon Sharwood, 27 May 2014

Android ransomware demands 12x more cash, targets English-speakers

Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove. The newest variant of Android/Simplocker displays the ransom note in English and asks for a higher ransom of $300. The latest version also encrypts a wider …
John Leyden, 23 Jul 2014
True Utility Scarab

True Utility Scarab and KeyTool micro multi-tools

My Victorinox CyberTool multiplex knife goes with me everywhere. But while it's bloody useful of disassembling hardware and putting it back together, it's not exactly compact. Ditto your average Leatherman multi-tool. Hence my interest in True Utility's Scarab, which squeezes a handful of tools down into a 50 35 x 7mm, 46g unit …
Tony Smith, 23 Aug 2010
FBcoldstoragearray

Facebook flashes its One Tool To Rule Them All in security threat analysis

Facebook has bragged about a new internal tool that combines all sorts of live data on internet security threats – such as any new malware doing the rounds and known dodgy URLS. The social network's engineers said the utility, imaginatively dubbed ThreatData, collects software nasties shared by researchers and also throws in …
Iain Thomson, 26 Mar 2014
Rickmote

Chromecast hack Rickrolls Google's TV stick

Chromecast-owning households may be set to endure Rick Astley's ghastly oeuvre, thanks to a new device that can hijack victims' TV sticks and insert replacement content. Dan Petro's device, the "Rickmote", is a slick Raspberry Pi box that can knock the Google Chromecast video streaming utility off wireless networks allowing …
Darren Pauli, 18 Jul 2014
CSR10X0 Starter Development Kit

Brit chip biz CSR rebuffs US takeover bid from Microchip Technologies

Fabless Bluetooth chip firm CSR, the second biggest chip design company in Cambridge, has rebuffed a takeover bid by customer and partner Microchip Technology. The failed bid has trigged another round of CSR thinking about putting itself up for sale, and given its history of a roller-coaster share price, now might be a very good …
Simon Rockman, 29 Aug 2014

British Gas Twitter account hijacked by mystery phishermen

An official British Gas Twitter account was hacked over the weekend as part of a phishing scam designed to harvest Twitter login credentials. The account @BritishGasHelp, which is normally geared towards helping people with boiler breakdowns and other queries, was taken over to push a series of ostensibly jokey tweets. The …
John Leyden, 23 Jun 2014
Privacy image

Flaw in Google's Dropcam sees it turned into SPYCAM

Hackers could inject fake video into popular home surveillance kit Dropcam and use the system to attack networks, researchers Patrick Wardle and Colby Moore say. The wide-ranging attacks were tempered by the need for attackers to have physical access to the devices but the exploits offer the chance to inject video frames into …
Darren Pauli, 15 Jul 2014
EMET

Redmond's EMET defense tool disabled by exploit torpedo

Microsoft's Enhanced Mitigation Toolkit (EMET) tool can be deactivated andbypassed according to Offensive Security researchers. The exploit struck dead the latest standard and updated version 4.1 of EMET designed to make attacks more complex and expensive through the use of Address Space Layout Randomisation and Data Execution …
Darren Pauli, 02 Jul 2014

WinPhone's Halo hottie Cortana to hit desktop in next Windows – report

Microsoft may be planning to graduate Windows Phone 8.1's Halo-inspired Cortana digital assistant from the small screen to a full-fledged desktop utility in the next version of Windows, if the Redmond rumor mill is to be believed. The snoops over at Neowin.com first noticed Cortana running on prerelease builds of Windows " …
Neil McAllister, 12 Aug 2014
Evil Android

Android banking apps vulnerable to cash theft by CAS hole hackers

Hackers can swipe login credentials and other sensitive data from one in 10 Android banking apps, and about six per cent of all Android apps, IBM researchers warn. Users should avoid using the vulnerable apps, which were built using Apache Cordova up to version 3.5.0, until they have been updated to squash the bug. Big Blue's …
John Leyden, 06 Aug 2014
The Register breaking news

Trojan poses as Adobe update utility

Miscreants have begun creating malware that overwrites software update applications from Adobe and others. Email malware that poses as security updates from trusted companies is a frequently used hacker ruse. Malware posing as update utilities, rather than individual updates, represents a new take on the ruse. Vietnam-based …
John Leyden, 29 Mar 2010
Communication Chambers chart 1

Government report: average Oz user will want 15 Mbps by 2023

With the launch of the report, communications minister Malcolm Turnbull seems to have taken a more generous view of the predictability of the future. In April 2013, Turnbull scorned predictions five to ten years in the future were uncertain, adding that he was ““knowledgeable enough and modest enough to know that you can't …

Google spaffs $80m on Sun-powered kit: Calm down, Oracle. It's SOLAR

Google will invest $80m in solar-powered plants as it keeps in mind exactly what may end up powering its data centers in future. The ad giant and investment firm KKR will work together to bankroll the construction of six new solar farms in the American Southwest. The facilities are slated to be built in the desert regions of …
Shaun Nichols, 15 Nov 2013
Amazonpic

Amazon 'not interested in price matching everybody' in the cloud

Google, Microsoft, and Amazon are battling each other on cloud computing prices, but Amazon has said it will not match Google's new low, low prices. This is significant because on Tuesday Google dramatically dropped the prices of its mainstay storage and compute services to far below those of Amazon. Then on Wednesday Amazon …
Jack Clark, 26 Mar 2014
The Register breaking news

DNS Trojan poses as iPhone unlocking utility

An application that offers to unlock iPhones is actually designed to hijack internet connections on compromised Windows PCs, security watchers warn. Spam messages direct potential victims to a domain called iphone-iphone.info that offers links to download a Windows executable called blackra1n.exe. The application claims to offer …
John Leyden, 15 Apr 2010

Apple stabs Heartbleed bug in AirPort Extreme, Time Capsule gear

Apple has posted a security update to address instances of the Heartbleed security vulnerability in its AirPort router and file back-up gadgets. The company said that a firmware update for the AirPort Extreme and AirPort Time Capsule home network appliances would address the infamous CVE-2014-0160 OpenSSL security vulnerability …
Shaun Nichols, 24 Apr 2014

'Two-speed internet' storm turns FCC.gov into zero-speed website

The US Federal Communications Commission (FCC) has extended the deadline for public comment on its net neutrality proposals – after a flood of traffic borked the agency's website yet again. At the heart of the proposals are rules that could allow huge corporations to pay for prioritized internet traffic. While on the one hand, …
Iain Thomson, 15 Jul 2014
Dambuster_Mohne_dam_breach

Puff on a hybrid – next thing you know, you're hooked on a public cloud

I had a flash of inspiration today. Hybrid public-private cloud systems are becoming a gateway drug to pure public clouds. Why is this an arguable view? Let’s look to the ideas discussed within The Big Switch, written by Nicholas Carr. In his seminal book, Carr argues that a public IT utility provider will provide CPU cycles and …
Chris Mellor, 11 Apr 2014
The Register breaking news

Penguins, I give you: The SOLAR-POWERED Ubuntu laptop

WeWi Telecommunications has built what it claims is the world’s first “fully solar-powered laptop”, which it says never needs to be juiced up at the mains. The SOL, a solar-powered Ubuntu machine on the Canadian telco’s blog here, is billed as “the all-terrain, off-road, sport-utility laptop.” SOL is for when you need to be “ …
Gavin Clarke, 07 Aug 2013

Who will kill power companies? TESLA, says Morgan Stanley

With Tesla and Panasonic prepping the giant erection called the GigaFactory, Morgan Stanley has penned an investor note predicting that Elon Musk's big battery footprint will become a major disruptor to power utilities. It's hardly disinterested, since the financiers were underwriters for a Tesla fundraising round in the past, …
SEO

Flaws open gates to WordPress en-masse SEO beat-down

Wordpress sites running the popular All in One SEO Pack plugin could have search rankings beaten down by readers and malicious code injected into pages due to dangerous vulnerabilities patched yesterday. The flaws allowed hackers to launch privilege escalation and cross site scripting attacks against vulnerable sites running old …
Darren Pauli, 02 Jun 2014
Screenshot of Google captcha that reads: "nodick"

Google boffins beat own Captchas

A group of Google scientists working on extracting numbers from StreetView images has discovered that their technology can also match humans at solving captchas. The aim, according to their research paper (at Arxiv, here), was to automatically extract accurate street number data from StreetView images so as to improve Google …

IBM, AT&T ink global Internet of Things tie-up

Big Blue and AT&T are moving to wrap up a chunk of the Internet of Things, announcing a global partnership that's as nebulous as the concept it's embracing. Starting with a focus on utilities and city administrations (the latter having long been in IBM's sights), the alliance is pitched as having “privacy in mind” as the two …

CryptoLocker victims offered free key to unlock ransomed files

Security researchers have released a tool that allows victims of the infamous CryptoLocker ransomware to unlock their computers at no charge. DecryptoLocker from net security firm FireEye and threat intelligence company FoxIT offers a cure for the estimated 500,000 victims of CryptoLocker. Victims need to upload a CryptoLocker- …
John Leyden, 06 Aug 2014
The Register breaking news

Fake SMS snoop utility turns spies into zombies

A new variant of the infamous Waledac botnet client doing the rounds poses as a utility that allows would-be snoops to view other other people's SMS messages online. The fake utility uses various filenames including sms.exe, freetrial.exe, and smstrap.exe but actually contain a variant of the Waledac malware. Anti-virus vendors …
John Leyden, 16 Apr 2009
LIFE_SUPPORT_HEART_AND_LUNG_MACHINE

TrueCrypt hooked to life support in Switzerland: 'It must not die' say pair

Two programmers hope to resurrect development of disk-encryption tool TrueCrypt after its original developers quit the project. The official TrueCrypt.org website abruptly shut up shop last week ostensibly because its secretive maintainers felt they could no longer keep the software secure. They blamed the Microsoft's …
John Leyden, 04 Jun 2014
Synology DS410

Ransomware attack hits Synology's NAS boxen

Synology Diskstations and Rackstations are being hit by malware dubbed Synolocker. The malware is a similar to the infamous Cryptolocker ransomware in that it encrypts all your files and then demands a ransom to unlock them. The vulnerabilities that enable the malware appear to rely on hard-coded passwords to recommended …
Trevor Pott, 05 Aug 2014
graph up

Quest Software hangs toolmaker VKernel on its utility belt

In what has to be the shortest press release in the history of IT, Quest Software announced that it had acquired VKernel, which peddles a capacity management, optimization, and chargeback system for VMware ESXi and Microsoft Hyper-V hypervisors. Quest says that VKernel – based in Boston, Massachusetts – would be operated as an …
Software-Defined Storage for Dummies. It's a real book!

IBM releases Software-Defined Storage For Dummies - no joke

IBM has written its own Software Defined Storage for Dummies book (PDF) focusing on – you guessed it – its home-brewed General Parallel File System Elastic Storage.* It defines software-defined storage like this: At its most basic level, software defined storage is enterprise class storage that uses standard hardware with all …
Chris Mellor, 13 Jun 2014
TrueCrypt

TrueCrypt audit: Probe's nearly all the way in ... no backdoor hit yet

The first phase of crowd-funded audit of TrueCrypt has turned up several vulnerabilities, but nothing particularly amiss and certainly nothing that looks like a backdoor. iSEC Partners, which was contracted to carry out the audit by the Open Crypto Audit Project (OCAP), ‪found‬ 11 vulnerabilities in the full disk and file …
John Leyden, 15 Apr 2014
slow_sign

UK.gov warned: Small biz bods 'blunted' by broadband bumbling

Small businesses in Britain are missing out on the government's £1.2bn taxpayer-funded broadband deployment project, a lobby group warned today. The Federation of Small Businesses (FSB) complained in a report titled The fourth utility (PDF) published this morning that 45,000 companies in the UK remained stuck using dial-up …
Kelly Fiveash, 14 Jul 2014

Apple inaugurates free OS X beta program for world+dog

Notoriously secretive Apple has always kept its beta builds of OS X out of the hands of the hoi polloi by limiting their availability only to registered developers, so it is with some surprise that said polloi can now get their own hands on said builds through a new OS X Beta Seed Program. Apple's announcement of the new OS X …
Rik Myslewski, 22 Apr 2014
TrueCrypt

TrueCrypt audit project founder: 'We've set our sights high'

A TrueCrypt audit project has uncovered a well of technical support with its plans to publicly audit the widely used disk and file encryption utility for the first time. TrueCrypt is a widely used utility that encrypts and decrypts entire drives, partitions or files within a virtual disk. The tool can also hide volumes of data …
John Leyden, 18 Nov 2013
The Register breaking news

Water utility auditor resigns, transfers $9m offshore

California and federal officials are searching for a former employee of a large water utility who is suspected of trying to transfer more than $9m to an offshore account after quitting the company. Abdirahman Ismail Abdi made the brazen transfers on April 27, just hours after resigning from the California Water Services Company …
Dan Goodin, 26 May 2009
Apple iMac 21.5in late 2012

Backup bods Acronis extend disk-imaging support to Macs at last

Data protection house Acronis is announcing True Image for Mac (TIM - our acronym), the Apple equivalent of its True Image for Windows backup and recovery software. True Image is a full disk image backup utility. Up until now, TIM has only supported Windows. It does not run on Macs, either under Mac OS X, or with Windows running …
Chris Mellor, 24 Jun 2014