Feeds

Articles about Utility

Mandiant to probe gaps in rusty unpatchable utility systems

Mandiant has launched a managed gap assessment for industrial control systems (ICS) it says will help administrators deal with temperamental systems. It was a "light touch" for legacy or leviathan systems that could fall over in the event of tinkering or patching. Mandiant SCADA bod Dan Scali said the system was geared to …
Darren Pauli, 08 Oct 2014
True Utility FlyEye 7 LED torch

True Utility FlyEye 7 LED torch

Daily product reviews in 140 characters. True Utility FlyEye 7 Pictures True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch True Utility FlyEye 7 LED torch
Tony Smith, 17 Jun 2011
The Register breaking news

Google shakes up US utility with green power tariff

Google is using its giant pile of money to try and change how utility companies work, so that more businesses can buy their power from renewable sources. As part of a $600m expansion of its North Carolina data center, Google's local utility provider Duke Energy has pledged to develop a renewable energy tariff for Google and …
Jack Clark, 19 Apr 2013
The Register breaking news

CSC secures A$25m utility deal

Utility Powercor-CitiPower has awarded CSC a renewed five-year IT services contract worth AU$25m. CSC was the incumbent provider of IT services for Victoria's largest electricity distributor. The last time the contract was extended in 2006, the five-year contract was valued at $AU17.8m. The utility giant provides services to …
The Register breaking news

Here's the $4.99 utility that might just have saved Windows 8

Veteran software outfit Stardock has offered Microsoft an elegant way to escape its Windows 8 Metro Notro dilemma. With Windows 8, Redmond foisted a new and radical touchscreen-driven user interface on a desktop PC market that was already in a once-in-a-generation slump - and both consumer sales and enterprise interest have been …
Andrew Orlowski, 08 Mar 2013
The Register breaking news

Water utility hackers destroy pump, expert says

Hackers destroyed a pump used by a US water utility after gaining unauthorized access to the industrial control system it used to operate its machinery, a computer security expert said. Joe Weiss, a managing partner for Applied Control Solutions, said the breach was most likely performed after the attackers hacked into the …
Dan Goodin, 17 Nov 2011
The Register breaking news

Trojan poses as skeleton key jailbreak utility

Miscreants have created a Trojan that poses as a rumoured jailbreak utility for the latest iPhones. A utility reportedly in development will allow users to run software of their choice on any Apple smartphone, even those running iOS 4.0.2 or iOS 4.1. The greenpois0n utility takes advantage of a security shortcoming in bootrom …
John Leyden, 22 Sep 2010
The Register breaking news

Australian utility evaluates EV charging kit

Queensland-based electricity utility Ergon Energy is seeking expressions of interest for companies to help it evaluate electric vehicle charging infrastructure. Earlier this month, US-based Portus announced that Ergon would run tests in the north Queensland city of Townsville to see how well Portus’s electric vehicle support …

Mozilla and Facebook snip a further five per cent from all JPEGs

Just four months after loosing the mozjpeg encoder on a waiting world, Mozilla has updated it to version 2.0, at the same time announcing that Facebook is testing the new iteration. The Social NetworkTM has also slung Mozilla $US60,000 towards the development effort in anticipation of mozjpeg 3.0. Mozjpeg, first released in …

ScaleXtreme adds patch management to cloudy utility belt

ScaleXtreme, the upstart cloud-based systems management tool maker that is taking on heavyweights like IBM, CA, HP, and BMC, is adding patch management to its utility belt. The company launched its Xpert cloud-based systems management tool last June, which can build images for physical and virtual servers as well as public …
EVO: RAIL

What the Dell? Big Mike and co join Nexenta for EVO: RAIL file access

Dell is using Nexenta's software to bring file access to VMware's EVO: RAIL virtual SAN. It is shipping NexentaConnect and NexentaStor software with its EVO: RAIL kit, its pre-configured, fully integrated, hyper-converged appliance. NexentaStor is Nexenta's ZFS-based storage software which runs on certified server/storage …
Chris Mellor, 15 Oct 2014
The Register breaking news

Second water utility reportedly hit by hack attack

Images posted online suggest that hackers may have gained unauthorized access to computers controlling a second water treatment facility, a claim that raises additional concerns about of the security of the US's critical infrastructure. Five computer screenshots posted early Friday purport to show the user interface used to …
Dan Goodin, 18 Nov 2011

You've heard of the internet, right? Well this here might just be the INTERCLOUD

Equinix has removed one of the most intractable stumbling blocks in cloud computing's evolution from a high-price, differentiated market into one of low-cost utilities – by making it trivial for customers to suck data out of one provider and pour it into another. The colocation provider announced its Cloud Exchange service on …
Jack Clark, 30 Apr 2014

Sync'n'steal: Hackers brew Android-targeting Windows malware

Internet Igors have stitched together the first strain of Windows malware that can hop over and infect Android smartphones and tablets. The Droidpak mobile banking trojan exploits syncing between smartphones and Windows PCs to jump from a compromised PC onto an Android device. The Windows Trojan downloads a malicious .APK file …
John Leyden, 27 Jan 2014
David Cameron, UK prime minister

Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...

As is ever the case, by the time squares have caught on to the value of whatever hipsters have been doing this week, the latter are off doing something else entirely. Much the same happens with economic fashions: it takes time for those not actually involved in the subject to grok to what the cool kids are saying and by the time …
Tim Worstall, 19 Oct 2014
Bug bounties

Apple finally patches Bash Shellshock vuln that WAS NOT A WORRY, OK?

Apple and F5 are the latest big-name vendors to post responses to the “Shellshock” vulnerability in Bash. Just days after saying “the vast majority of OS X users are not at risk”, Cupertino has posted Bash fixes for OS X Lion, Mountain Lion, and Mavericks. The fix is now available in OS X users' Software Update. It would, …
True Utility Scarab

True Utility Scarab and KeyTool micro multi-tools

My Victorinox CyberTool multiplex knife goes with me everywhere. But while it's bloody useful of disassembling hardware and putting it back together, it's not exactly compact. Ditto your average Leatherman multi-tool. Hence my interest in True Utility's Scarab, which squeezes a handful of tools down into a 50 35 x 7mm, 46g unit …
Tony Smith, 23 Aug 2010
Nvidia

ARM64 gets better GPU support in CUDA release

NVIDIA has launched the next upgrade to its parallel computing and programming platform, with CUDA 6.5 going live as a production release. The free download here puts 64-bit ARM platforms on a par with x86, by letting them take advantage of GPU acceleration. As NVIDIA claims in this blog, the combination of low-power ARM64 …

Govt control? Hah! It's IMPOSSIBLE to have a successful command economy

One of the perennials of the great economic debate is those who insist that if we centrally planned how the economy would run, it would all work much better than this messy competition, profit-and-loss and duplication-of-effort system we're stuck with at the moment. And it didn't all start with the Soviets. Back in late- …
Tim Worstall, 13 Aug 2014
ipod u2 edition

Apple gives fanbois The Sweetest Thing: A delete button for that U2 album

It's a Beautiful Day: Apple has created a utility to remove U2's Songs of Innocence album that was force-fed into people's iCloud libraries overnight. The delete tool, available from itunes.com/soi-remove, ejects the Irish boy band's free album from devices and iTunes accounts once and for all. "Once the album has been removed …
Shaun Nichols, 15 Sep 2014
Avast! Free Anti-virus utility

Antivirus firm Avast! takes down forums after breach

Antivirus firm Avast! has 'fessed up to a breach. The small upside is that the mess only impacts the company's forums. As the company's CEO Vincent Steckler has blogged “Less than 0.2% of our 200 million users were affected. No payment, license, or financial systems or other data was compromised.” Don't click away to another …
Simon Sharwood, 27 May 2014
Shrieking Eel

South Korea's top wireless carrier builds Internet of Eels

Eels, a staple in many world cuisines, are apparently more sensitive to their environment when grown in aquaculture facilities than they are in the wild, so South Korean farmers are turning to industrial automation to give them a hand. Given the inevitable Internet-of-Things-spin, SK Telecom says it's going to implement wireless …

Android ransomware demands 12x more cash, targets English-speakers

Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove. The newest variant of Android/Simplocker displays the ransom note in English and asks for a higher ransom of $300. The latest version also encrypts a wider …
John Leyden, 23 Jul 2014
Collmotdrones

FAA clears SWARM of MOVIE DRONES for take-off

The US aviation authority has taken the first step on the road to the (potential) over-run of the skies with commercial drones – granting six video and photo production firms an exemption to fly drones for movie-making and picture snapping. The Federal Aviation Administration (FAA) also said that it was considering 40 other …
Trajectory-cutting to preserve anonymity

Your location info is too revealing: data boffins

A group of researchers partly supported by SAP has taken a look at one of the big problems with so-called “anonymised” data: the way spatial correlations in mobile data can be used to re-identify individuals in large data sets. Location data is the big problem, the Singapore-led group says: even if the resolution of a phone's …
FBcoldstoragearray

Facebook flashes its One Tool To Rule Them All in security threat analysis

Facebook has bragged about a new internal tool that combines all sorts of live data on internet security threats – such as any new malware doing the rounds and known dodgy URLS. The social network's engineers said the utility, imaginatively dubbed ThreatData, collects software nasties shared by researchers and also throws in …
Iain Thomson, 26 Mar 2014
management strategy3

Enormo reseller Insight hires former Cisco man to run EMEA services

Insight EMEA claims to have taken a step forward on the long and winding path to tech services glory by recruiting a former Cisco and PricewaterhouseCoopers consulting chief to head up a newly erected division. A pan-regional services team will be fronted by newly installed veep Rolf Adam, who mostly recently served as industry …
Paul Kunert, 30 Sep 2014
Rickmote

Chromecast hack Rickrolls Google's TV stick

Chromecast-owning households may be set to endure Rick Astley's ghastly oeuvre, thanks to a new device that can hijack victims' TV sticks and insert replacement content. Dan Petro's device, the "Rickmote", is a slick Raspberry Pi box that can knock the Google Chromecast video streaming utility off wireless networks allowing …
Darren Pauli, 18 Jul 2014
CSR10X0 Starter Development Kit

Brit chip biz CSR rebuffs US takeover bid from Microchip Technologies

Fabless Bluetooth chip firm CSR, the second biggest chip design company in Cambridge, has rebuffed a takeover bid by customer and partner Microchip Technology. The failed bid has trigged another round of CSR thinking about putting itself up for sale, and given its history of a roller-coaster share price, now might be a very good …
Simon Rockman, 29 Aug 2014
The Register breaking news

Trojan poses as Adobe update utility

Miscreants have begun creating malware that overwrites software update applications from Adobe and others. Email malware that poses as security updates from trusted companies is a frequently used hacker ruse. Malware posing as update utilities, rather than individual updates, represents a new take on the ruse. Vietnam-based …
John Leyden, 29 Mar 2010

British Gas Twitter account hijacked by mystery phishermen

An official British Gas Twitter account was hacked over the weekend as part of a phishing scam designed to harvest Twitter login credentials. The account @BritishGasHelp, which is normally geared towards helping people with boiler breakdowns and other queries, was taken over to push a series of ostensibly jokey tweets. The …
John Leyden, 23 Jun 2014
Privacy image

Flaw in Google's Dropcam sees it turned into SPYCAM

Hackers could inject fake video into popular home surveillance kit Dropcam and use the system to attack networks, researchers Patrick Wardle and Colby Moore say. The wide-ranging attacks were tempered by the need for attackers to have physical access to the devices but the exploits offer the chance to inject video frames into …
Darren Pauli, 15 Jul 2014
EMET

Redmond's EMET defense tool disabled by exploit torpedo

Microsoft's Enhanced Mitigation Toolkit (EMET) tool can be deactivated andbypassed according to Offensive Security researchers. The exploit struck dead the latest standard and updated version 4.1 of EMET designed to make attacks more complex and expensive through the use of Address Space Layout Randomisation and Data Execution …
Darren Pauli, 02 Jul 2014

WinPhone's Halo hottie Cortana to hit desktop in next Windows – report

Microsoft may be planning to graduate Windows Phone 8.1's Halo-inspired Cortana digital assistant from the small screen to a full-fledged desktop utility in the next version of Windows, if the Redmond rumor mill is to be believed. The snoops over at Neowin.com first noticed Cortana running on prerelease builds of Windows " …
Neil McAllister, 12 Aug 2014
Apple iPhone 6

Apple slings iOS 8.1 at world+dog: Essential 9-step guide to installing it

Apple has made available iOS 8.1, enabling features on the iPhone 6 and other new Apple devices. The company said the 8.1 update will allow users to begin using the Apple Pay platform with their iPhone 6 and 6 Plus NFC-enabled handsets. This allows users to link their bank accounts with the Apple Pay software, so when the phone …
Shaun Nichols, 20 Oct 2014
Evil Android

Android banking apps vulnerable to cash theft by CAS hole hackers

Hackers can swipe login credentials and other sensitive data from one in 10 Android banking apps, and about six per cent of all Android apps, IBM researchers warn. Users should avoid using the vulnerable apps, which were built using Apache Cordova up to version 3.5.0, until they have been updated to squash the bug. Big Blue's …
John Leyden, 06 Aug 2014

Google spaffs $80m on Sun-powered kit: Calm down, Oracle. It's SOLAR

Google will invest $80m in solar-powered plants as it keeps in mind exactly what may end up powering its data centers in future. The ad giant and investment firm KKR will work together to bankroll the construction of six new solar farms in the American Southwest. The facilities are slated to be built in the desert regions of …
Shaun Nichols, 15 Nov 2013
The Register breaking news

DNS Trojan poses as iPhone unlocking utility

An application that offers to unlock iPhones is actually designed to hijack internet connections on compromised Windows PCs, security watchers warn. Spam messages direct potential victims to a domain called iphone-iphone.info that offers links to download a Windows executable called blackra1n.exe. The application claims to offer …
John Leyden, 15 Apr 2010
Amazonpic

Amazon 'not interested in price matching everybody' in the cloud

Google, Microsoft, and Amazon are battling each other on cloud computing prices, but Amazon has said it will not match Google's new low, low prices. This is significant because on Tuesday Google dramatically dropped the prices of its mainstay storage and compute services to far below those of Amazon. Then on Wednesday Amazon …
Jack Clark, 26 Mar 2014
Heatmiser PRS-TS WiFi RF Thermostat

Heatmiser digital thermostat users: For pity's sake, DON'T SWITCH ON the WI-FI

Digital thermostats from Heatmiser are wide open to takeover thanks to default login credentials and myriad other security flaws. The UK-based manufacturer has promised to develop a fix. Pending the arrival of a patch, users are advised to disable the device's Wi-Fi capability. The security flaws were discovered by Andrew …
John Leyden, 24 Sep 2014

Apple stabs Heartbleed bug in AirPort Extreme, Time Capsule gear

Apple has posted a security update to address instances of the Heartbleed security vulnerability in its AirPort router and file back-up gadgets. The company said that a firmware update for the AirPort Extreme and AirPort Time Capsule home network appliances would address the infamous CVE-2014-0160 OpenSSL security vulnerability …
Shaun Nichols, 24 Apr 2014
Brazil flag

Logicalis: World Cup and IBM kit drop-off hit us hard in H1

Excitable Brazilian firms initiated a network spending freeze during the World that led to a $50m drop-off in kit sales for Logicalis, the integrator’s parent company Datatec said today. Turnover for the first half of fiscal 15 ended August came in seven per cent below the same period a year ago at $714.4m, which when coupled …
Paul Kunert, 15 Oct 2014

'Two-speed internet' storm turns FCC.gov into zero-speed website

The US Federal Communications Commission (FCC) has extended the deadline for public comment on its net neutrality proposals – after a flood of traffic borked the agency's website yet again. At the heart of the proposals are rules that could allow huge corporations to pay for prioritized internet traffic. While on the one hand, …
Iain Thomson, 15 Jul 2014
Dambuster_Mohne_dam_breach

Puff on a hybrid – next thing you know, you're hooked on a public cloud

I had a flash of inspiration today. Hybrid public-private cloud systems are becoming a gateway drug to pure public clouds. Why is this an arguable view? Let’s look to the ideas discussed within The Big Switch, written by Nicholas Carr. In his seminal book, Carr argues that a public IT utility provider will provide CPU cycles and …
Chris Mellor, 11 Apr 2014
The Register breaking news

Penguins, I give you: The SOLAR-POWERED Ubuntu laptop

WeWi Telecommunications has built what it claims is the world’s first “fully solar-powered laptop”, which it says never needs to be juiced up at the mains. The SOL, a solar-powered Ubuntu machine on the Canadian telco’s blog here, is billed as “the all-terrain, off-road, sport-utility laptop.” SOL is for when you need to be “ …
Gavin Clarke, 07 Aug 2013
The Register breaking news

Fake SMS snoop utility turns spies into zombies

A new variant of the infamous Waledac botnet client doing the rounds poses as a utility that allows would-be snoops to view other other people's SMS messages online. The fake utility uses various filenames including sms.exe, freetrial.exe, and smstrap.exe but actually contain a variant of the Waledac malware. Anti-virus vendors …
John Leyden, 16 Apr 2009
SEO

Flaws open gates to WordPress en-masse SEO beat-down

Wordpress sites running the popular All in One SEO Pack plugin could have search rankings beaten down by readers and malicious code injected into pages due to dangerous vulnerabilities patched yesterday. The flaws allowed hackers to launch privilege escalation and cross site scripting attacks against vulnerable sites running old …
Darren Pauli, 02 Jun 2014

Who will kill power companies? TESLA, says Morgan Stanley

With Tesla and Panasonic prepping the giant erection called the GigaFactory, Morgan Stanley has penned an investor note predicting that Elon Musk's big battery footprint will become a major disruptor to power utilities. It's hardly disinterested, since the financiers were underwriters for a Tesla fundraising round in the past, …
Screenshot of Google captcha that reads: "nodick"

Google boffins beat own Captchas

A group of Google scientists working on extracting numbers from StreetView images has discovered that their technology can also match humans at solving captchas. The aim, according to their research paper (at Arxiv, here), was to automatically extract accurate street number data from StreetView images so as to improve Google …
DataDirect Networks GS2K appliance

DataDirect Networks stuffs tricky GPFS file system into GS7K box

DataDirect Networks has bundled IBM's GPFS parallel file system, which uses GridScaler technology, into its GS7K appliance. The appliance can use its WOS object storage as a huge back-end vault, which DDN hopes will remove GPFS set-up complexity while preserving standardised NAS access. GPFS systems are known to be powerful but …
Chris Mellor, 01 Oct 2014