Feeds

Articles about Variants

management regulation1

Cisco slings small change at CSIRO over WiFi dispute

Australia's Commonwealth Scientific and Industrial Research Organisation (CSIRO) has wrapped up a loose end in its long-running patent arguments over WiFi, winning an American judgement against Cisco over royalty payments for CSIRO's technology. The long-standing argument wasn't over patent infringement – both parties agreed …
Haswell-E Motherboards

Intel's Haswell-E brain to emerge from the lab at end of August – reports

Intel has reportedly fixed a date to ship its octo-core Haswell-E processors and X99 Express chipset, with a Japanese outlet saying they will hit the shelves on August 29. Japan's Hermitage Akihabara says the high-end desktop silicon and associated motherboards have been brought forward a little from the expected September ship …
Cryptowall ransomware notice

KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION

Victims of the CryptoWall ransomware have been extorted out of at least $1m. Despite a takedown operation in June, CryptoWall continues to be the largest and most destructive ransomware threat on the internet, according to the latest analysis of the threat by security researchers from Dell SecureWorks Counter Threat Unit. …
John Leyden, 29 Aug 2014
Apple iPod Classic

Apple's ONE LESS THING: the iPod Classic disappears

Amid all the colour and movement generated by Tuesday's launch of new iPhones and the Apple Watch, Cupertino looks to have quietly killed the iPod Classic. A visit to www.apple.com/ipod/ or its national variants reveals a range of iPods that includes the iPod Shuffle, Nano and Touch, plus the Apple TV. But there's no mention of …
Simon Sharwood, 10 Sep 2014
Intel Xeon

Intel's SECRET Xeons: tell us what you think Chipzilla's hiding

At the Australian launch of Intel's new Xeon E5-2600 v3 yesterday, Chipzilla's local folks popped up a slide trumpeting the fact that the chip now comes in 35 special flavours. Your correspondent asked Intel to name a few, which prompted a response that pre-launch debate considered whether or not to include the slide because …
Simon Sharwood, 10 Sep 2014
Ultrastar_SSD1600MH

HGST polishes Ultrastar SSD whoppers, stuffs with denser Intel flash

HGST has refreshed its Ultrastar enterprise SSD line, using denser 20nm NAND to replace the previous 25nm flash, doubling capacity, upping read performance but lowering write performance a tad in the process. The starting point was a three-product Ultrastar SSD800 line-up, maxing out at 800GB and coming in MH (write-intensive), …
Chris Mellor, 28 Jul 2014
Flytrap

Use home networking kit? DDoS bot is BACK... and it has EVOLVED

A router-to-router bot first detected two years ago has evolved - and now has the capability to reconfigure the firewalls of its victims. The Lightaidra malware captured by security researcher TimelessP (@TimelessP) is an IRC-based mass router scanner/exploiter that's rare because it spreads through consumer network devices …
John Leyden, 09 Sep 2014

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014

Dodgy installer drops Trojan in Japanese Buffalo update

Buffalo in Japan is red-faced after its Website shipped Trojan-infected Windows driver updates for a bunch of its peripherals, including broadband routers, home NAS, and Bluetooth mice. According to this notice (Google translation here), the installers were modified to include Infostealer.Bankeiya.B, which steals bank account …

Attackers fling Stuxnet-style RATs at critical control software in EUROPE

Security researchers have uncovered a series of Trojan-based attacks which have infiltrated several targets by infecting industrial control system software from the makers of SCADA and ICS systems. The majority of the victims are located in Europe, though at the time of writing at least one US firm's compromised gear appears to …
John Leyden, 26 Jun 2014
twitchpokemon

Beware geeks bearing gifts: Steam-draining nasty spreads via Twitch

Infosec bods are warning of new malware spreading through game-streaming web hit Twitch: the software nasty subverts Steam accounts to drain player's wallets, and could take away all their precious weaponry. eskimo I've got 99 problems but a Twitch ain't one The malware spreads by bombarding users of Twitch's chat feature …
Iain Thomson, 12 Sep 2014
management regulation1

Apple wheels out sueball cannon, again

Apple and Google might have decided on a ceasefire in their global patent mutually-assured-destruction battle, but Cupertino-versus-Korea continues to grind on. In its latest move, Apple has fired off two new sueballs: one seeks a permanent injunction preventing the sale of now nearly-obsolete Samsung products in the US; the …
Zombie Zero

Infected Chinese inventory scanners ships off logistics intel

A Chinese manufacturer has been accused of implanting malware that steals supply chain intelligence in its hand-held scanner firmware. Security firm TrapX says infected scanners have been sold to eight unnamed firms including a large robotics company. Variants of the malware broke into enterprise resource planning platforms to …
Darren Pauli, 11 Jul 2014
Victorinox SwissFlash 8GB USB Memory Stick and Multi-Tool

Peak thumb drive is coming in 2016

Peak thumb drive is upon us: by 2016 sales of the ubiquitous storage medium will start to decline. So says the the Santa Clara Group's USB tracker for 2013's fourth quarter, which says last year saw humanity produce 273 million thumb drives. The average capacity of drives shipped in 2013's final quarter was 25 gigabytes, so the …
Simon Sharwood, 20 May 2014
Spying image

New software ported from Windows to Mac! You'll never guess what. Yes, it's spyware

Miscreants have ported five-year-old spyware XSLCmd to OS X. The Windows version of the malware has been around since 2009, and the Apple Mac edition of XSLCmd shares significant portions of the same code. It can open a reverse shell to its masters, automatically transfer your documents to a remote system, install executables, …
John Leyden, 05 Sep 2014
VDI Bandwidth Visio Image

Ding, ding! Round two with our VDI experts – put your Qs to the panel

Join us for the second live webinar in our VDI in the real world series as we explore the complexities of user virtualization with our expert panel. Building a Virtual Desktop Infrastructure (VDI) is much more than lashing together systems to handle the workload: user virtualization is of increasing importance, especially as VDI …
Trevor Pott, 07 Jul 2014
apple mac malware vxer

Mac security packages range from peachy to rancid – antivirus tests

Independent tests of Mac antivirus products have discovered that the effectiveness of these security packages runs from a risible 20 per cent to an unimpeachable 100 per cent. German security lab AV-TEST.org put 18 free and paid-for Mac OS X security products and services to the test, discovering widely differing performances in …
John Leyden, 04 Sep 2014
Kronos

'Father of Zeus' banking trojan appears at very reasonable price

A banking trojan dubbed the father of the infamous Zeus malware is being flogged on cybercrime marketplaces for a pricey $7000, says fraud specialist Etay Maor. The Kronos malware was sold on a cybercrime forum, pitched particularly to Zeus trojan customers given its capabilities to re-use that trojan's form grabbing templates …
Darren Pauli, 15 Jul 2014
iPhone 5C purported

Fancy a new iPhone 5C or 5S? READ THIS or you may not get 4G data

Apple might have launched two new iPhone models on Tuesday, but it launched 10 different variants as Cupertino struggles to cope with the hugely fragmented 4G market. Where a GSM phone might be dual-band or the frequent flyer might shell out for a quad-band handset, Apple's latest phones each come in five variants: two hendeca- …
Bill Ray, 11 Sep 2013
PCS with a red X in front of them

Swiping your card at local greengrocers? Miscreants will swipe YOU in a minute

More than a thousand point-of-sale, grocery management and accounting systems worldwide have been compromised by a new strain of malware, results of a March 2014 probe have revealed. During a survey of compromised POS terminals, accounting systems and grocery management platforms, the Nemanja botnet was fingered as one of the …
John Leyden, 27 May 2014

First China banned Bitcoin. Now its crooks are using malware to steal traders' wallets

Cybercrooks have developed a strain of malware that actively targets BTC China and other Bitcoin exchanges. A Zeus P2P/Gameover variant discovered by Trusteer is designed to steal the passwords of traders in the virtual currency. A blog post by the IBM-owned transaction security firm (extract below) explains that the malware is …
John Leyden, 19 Dec 2013
Parliament in the clouds

Oracle emerges from bureaucratic sludge clutching crucial cloud certificate

Oracle has gained a crucial federal certification that will make it easier for US government agencies to buy cloud services from the database giant. The company announced it had gained a provisional authority to operate under the Federal Risk and Authorization Management Program (FedRAMP) on Thursday, almost a year after cloud …
Jack Clark, 22 May 2014
Adidas Brazuca World Cup ball

Balls to the World Cup: Brazuca wins in the wind

In soccer, the ball matters: Japanese boffins say the new six-panel design to be used in the 2014 FIFA World Cup is the most stable and predictable in many a long year. Of course, the balls used in the World Cup are nothing like what oldsters like this correspondent would recognise. The old-style ball has long been replaced at …

Failover in FOUR SECONDS? HP's SAP-specific iron hits the streets

HP has added two SAP-specific implementation to its ConvergedSystem product line: the CS900 for enterprise customers, and the CS500 for the smaller shop. The pitch from HP is that with a configuration purpose-built for different application environments, it can get customers firing with new servers, without the sysadmin having …
Money image

Aerospike: Thanks for that $20m, VCs ... next we'll OPEN SOURCE our NoSQL database

Startup Aerospike has guzzled $20m in filthy valley lucre. And it'll use the cash to fund its assault on database incumbents, namely making its flash-oriented NoSQL software open source. The company told The Reg on Tuesday that this is not some crazy plan: its decision to publish its database server code under the AGPL license, …
Jack Clark, 24 Jun 2014
Space Gray!

Apple ships new iPods in 'SPAAAAACE ... Gray'

Apple has quietly updated several of its iPod media players with a new color option to match its latest flagship smartphone, the iPhone 5S. The new mobe, which debuted at a media event in Cupertino on Tuesday, comes in three different color schemes: the rather prosaic Silver and Gold, and the oddly named "Space Gray". Now a few …
Neil McAllister, 11 Sep 2013
IBM 'through-silicon via' stacked chips

Calxeda co-founder unleashs 48-core ARM SoC

ARM vendor Cavium has revealed 48-core silicon it reckons will pitch it into high-end data centre and server apps. Cavium has hired Larry Wikelius, co-founder of failed ARM server silicon vendor Calxeda, and his former colleague Gopal Hegde (who played a part in creating Cisco's UCS servers). Both are insistent that now is the …
Boeing 787 Dreamliner on the tarmac in United livery

Boeing CEO says no more 'moonshots' after 787 Dreamliner ordeal

After weathering a decade of delays, cost overruns, and technical difficulties with its latest high-tech aircraft, Boeing CEO James McNerney says the company isn't planning any more ambitious gambles like the 787 Dreamliner, but will instead focus on cutting costs and increasing production. According to a report by the Seattle …
Neil McAllister, 22 May 2014

Amazon loads Docker app containerization into its cloud

Although admins have been free to run Linux containerization technology Docker on top of Amazon Linux running on its rentable EC2 servers for some time, the company on Thursday announced that Docker had been integrated with Elastic Beanstalk. Elastic Beanstalk is a platform-as-a-service technology from Amazon which lets …
Jack Clark, 23 Apr 2014
Cloud security

Cloud vid wrangler Zencoder STRADDLES Amazon and Google

Cloud video encoder Zencoder has taken a deep breath and gingerly straddled two cloud providers in an attempt to offer customers greater infrastructure choice. The Brightcove-owned firm announced support for Google's just-released Google Compute Engine on Monday, giving Chocolate Factory aficionados access to a new …
Jack Clark, 10 Dec 2013
The Register breaking news

Trying to kill undead Pushdo zombies? Hard luck, Trojan is EVOLVING

The crooks behind the Pushdo botnet agent have developed variants of the malware that are more resistant to take-down attempts or hijacking by rival hackers. Dell SecureWorks and Damballa warned (PDF) on Wednesday that the latest variant of Pushdo comes packed with a fallback mechanism for cases where zombie clients are unable …
John Leyden, 17 May 2013
balaclava_thief_burglar

Boss at 'Microsoft' scam support biz told to cough £000s in comp

A fraudster who conned consumers, particularly silver surfers, into parting with cash to fix phantom PC bugs was handed a suspended sentence on Friday and ordered to pay thousands of pounds in costs and compensation. The national e-crime squad based in Yorkshire, together with ActionFraud, brought the case against Mohammed …
Paul Kunert, 31 Mar 2014

Something's phishy: More holiday scam spam flung at real hotel customers

Multiple customers at several hotels are getting hit up with a sophisticated phishing scam based on real hotel bookings. The latter all share the common factor of being made through Booking.com. Last week we reported how the wife of a Reg reader received a scam email after booking a family holiday in a hotel in Mallorca, Spain …
John Leyden, 18 Aug 2014

What's in it for server buyers now that Intel's Xeon E5-2600 v2 is here?

Autumn is on its way and Intel has released the "Ivy Bridge-EP" Xeon E5-2600 v2 server processors just in time to get in line for a chunk of the remaining 2013 IT budget at the data centers of the world. So how are these new processors going to stack up to the existing "Sandy Bridge-EP" Xeon E5-2600 v1 chips, and what can …
Red Hat OpenShift logo

Don't be shy, we know you've got .NET code. Why not run it on our Linux cloud – Red Hat

Red Hat plans to welcome Microsoft Windows .NET workloads onto its on-premises app-hosting cloud OpenShift Origin – as it attempts to close the gap between its technology and Pivotal's Cloud Foundry. The upgrade was announced on Wednesday by Red Hat, which will work with Uhuru Software to bring .NET and SQL Server support to its …
Jack Clark, 05 Mar 2014

Kinky Android X-ray app laid bare as malware

Japanese mobile users are being warned not to download an Android app promising to allow them to see through clothes with the phone’s camera, as the malware hidden within will steal address book data and try to blackmail them to the tune of ¥29,000 (£202). The app's first manifestation is usually an SMS message appearing to come …
Phil Muncaster, 20 Mar 2013
Iphone_hard_case

Put down that iPad! Snoopware RECORDS your EVERY gesture, TAP on iOS, Android

A security researcher has developed a proof-of-concept malware capable of capturing the actions of users on touchscreen devices. Senior security consultant Neal Hindocha and his colleagues at Trustwave were able to brew up similar strains of prototype malicious code for both rooted Android and jailbroken iOS devices. The line of …
John Leyden, 05 Feb 2014
Gemini X-series

Hey, Nimbus Data. What you doin' with those 4TB flash slabs? Making a 96TB box? We KNEW it!

Nimbus Data has announced a 10-node clustered all-flash array that can store up to 96TB in a single box. The Gemini X-series all-flash arrays build on the current Gemini F-series arrays, which come in F610/F620 variants with 56/40/20 Gbit/s InfiniBand and 40/10/1 Gbit/s Ethernet, and the F410/F420 which lack InfiniBand and use …
Chris Mellor, 04 Mar 2014
Pledging fealty

We're making TOO MUCH CASH, say CryptoLocker scum in ransom price cut

The soaring price of BitCoin has prompted the cybercrooks behind the infamous CryptoLocker malware to reduce the levy they impose on victims from 2 BTC to 0.5 BTC. The reduced price scam was spotted in variants of the malware, which encrypts personal files on infected Windows PCs, spotted earlier this week by security firm F- …
John Leyden, 25 Nov 2013
The Register breaking news

Cyber-007 MiniDuke stalked Europe for at least 21 MONTHS

MiniDuke, the recently discovered cyber-spy malware aimed at governments and their agencies in Europe and elsewhere, has been operating for at least 21 months. A sample of the software nasty, discovered by researchers at Romanian antivirus firm Bitdefender, dates back to at least 20 June, 2011. Later variants of the spying tool …
John Leyden, 05 Mar 2013
The Register breaking news

Seoul-blackening disk wipe badness linked to 4-year SPY CAMPAIGN

The March attack that hit tens of thousands of computers in South Korea was part of a much larger campaign waged against the Asian nation since at least 2009. That's according to a new report by security biz McAfee. About 30,000 PCs in banks, insurance companies and TV stations were knackered a few months ago on 20 March in an …
John Leyden, 11 Jul 2013
Lamport

Byzantine Generals co-boffin Lamport bags CompSci's 'Nobel prize'

Distributed systems researcher Leslie Lamport has been awarded the A.M. Turing award, computer science's equivalent to the Nobel Prize. The award for 2013 was given to Lamport "for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems." Another way of putting it is: no Lamport …
Jack Clark, 18 Mar 2014
Dogecoin

Hackers force innocent mobes to join ALTCOIN MINING GANGS

Cybercrooks are turning smartphones into digital currency-mining bots using mobile malware. The cyber-menace, dubbed CoinKrypt by mobile security firm Lookout, is capable of hijacking the processor on smartphones to mine digital currency, enriching hackers in the process. CoinKrypt has been confined thus far to Spanish pirated …
John Leyden, 27 Mar 2014
The Register breaking news

StoreOnce: HP issues patch

HP has advised The Register that a patch is now available for its StoreOnce storage systems. Yesterday, we reported that a blogger with the handle Technion had identified an undocumented administrator account in some of its StoreOnce systems. He had also posted the hash of the password associated with the HPSupport account. …
Motorola G at GSM Arena

Is it TRUE what they say about the 'Moto G'? We FIND OUT on the 13th

Google-owned Motorola’s rumoured lower-cost alternative to the top-of-the-range Moto X looks set to arrive in time for Santa to drop it down a few of the world’s chimneys this year. A suitably seasonal promotion card scanned and then posted on GSM Arena by a punter who claims to have found a batch about to be sent to Phones4u …
Tony Smith, 04 Nov 2013
Steam engine

Rackspace gives world the servers Google and Amazon keep secret

Troubled hosting company Rackspace has brewed up a life-saving potion based around the secret technologies developed by some of the web's giants. That project, "OnMetal Servers", gives customers the option of renting dedicated hardware from Rackspace based on designs similar to the secret servers operated by Google and Amazon, …
Jack Clark, 19 Jun 2014
John Robinson's Home Lab

Home lab operators: Ditch your servers ... now!

At last year's Melbourne VMware user group (VMUG) conference, VMware's Mike Laverick opined that IT pros need a home lab these days, because bosses have stopped shelling out for training. Plenty of you agreed with that proposition. Some even showed us their very own home labs. Most used old servers, an arrangement that this …
Simon Sharwood, 12 Feb 2014

Mobe-makers' BLOATWARE is Android's Achilles heel

Android's Achilles Heel is not Google, but vendors who pack their devices chock-full of dodgy software. That's the conclusion reached by North Carolina State University researchers led by Xuxian Jiang, who has spent some time analysing Android security. In the latest work, co-authored with Lei Wu, Michael Grace, Yajin Zhou and …
Red Hat Shadowman logo

Red Hat teams up with community-based RHEL lookalike CentOS

Enterprise Linux vendor Red Hat has announced a new partnership with the CentOS Project aimed at developing new versions of the community-developed CentOS Linux distribution that take advantage of the latest open-source technologies. "Today is an exciting day for the open-source community," Red Hat CTO Brian Stevens said in a …
Neil McAllister, 08 Jan 2014
BigFoot 4U Object chassis and rack

Scality slips its Ring around Kinetic drives

Scality is developing its RING object storage system to use Seagate’s Kinetic drives. These drives implement an on-board key/value store and are directly accessed over Ethernet using Get and Put requests. Each drive has two 1Gbit/s Ethernet ports. Scality’s RING storage uses scale-out nodes that can grow to multi-petabyte …
Chris Mellor, 01 Apr 2014