Feeds

Articles about Variants

Ultrastar_SSD1600MH

HGST polishes Ultrastar SSD whoppers, stuffs with denser Intel flash

HGST has refreshed its Ultrastar enterprise SSD line, using denser 20nm NAND to replace the previous 25nm flash, doubling capacity, upping read performance but lowering write performance a tad in the process. The starting point was a three-product Ultrastar SSD800 line-up, maxing out at 800GB and coming in MH (write-intensive), …
Chris Mellor, 28 Jul 2014

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014

Dodgy installer drops Trojan in Japanese Buffalo update

Buffalo in Japan is red-faced after its Website shipped Trojan-infected Windows driver updates for a bunch of its peripherals, including broadband routers, home NAS, and Bluetooth mice. According to this notice (Google translation here), the installers were modified to include Infostealer.Bankeiya.B, which steals bank account …

Attackers fling Stuxnet-style RATs at critical control software in EUROPE

Security researchers have uncovered a series of Trojan-based attacks which have infiltrated several targets by infecting industrial control system software from the makers of SCADA and ICS systems. The majority of the victims are located in Europe, though at the time of writing at least one US firm's compromised gear appears to …
John Leyden, 26 Jun 2014
management regulation1

Apple wheels out sueball cannon, again

Apple and Google might have decided on a ceasefire in their global patent mutually-assured-destruction battle, but Cupertino-versus-Korea continues to grind on. In its latest move, Apple has fired off two new sueballs: one seeks a permanent injunction preventing the sale of now nearly-obsolete Samsung products in the US; the …
Zombie Zero

Infected Chinese inventory scanners ships off logistics intel

A Chinese manufacturer has been accused of implanting malware that steals supply chain intelligence in its hand-held scanner firmware. Security firm TrapX says infected scanners have been sold to eight unnamed firms including a large robotics company. Variants of the malware broke into enterprise resource planning platforms to …
Darren Pauli, 11 Jul 2014
Victorinox SwissFlash 8GB USB Memory Stick and Multi-Tool

Peak thumb drive is coming in 2016

Peak thumb drive is upon us: by 2016 sales of the ubiquitous storage medium will start to decline. So says the the Santa Clara Group's USB tracker for 2013's fourth quarter, which says last year saw humanity produce 273 million thumb drives. The average capacity of drives shipped in 2013's final quarter was 25 gigabytes, so the …
Simon Sharwood, 20 May 2014
VDI Bandwidth Visio Image

Ding, ding! Round two with our VDI experts – put your Qs to the panel

Join us for the second live webinar in our VDI in the real world series as we explore the complexities of user virtualization with our expert panel. Building a Virtual Desktop Infrastructure (VDI) is much more than lashing together systems to handle the workload: user virtualization is of increasing importance, especially as VDI …
Trevor Pott, 07 Jul 2014
Kronos

'Father of Zeus' banking trojan appears at very reasonable price

A banking trojan dubbed the father of the infamous Zeus malware is being flogged on cybercrime marketplaces for a pricey $7000, says fraud specialist Etay Maor. The Kronos malware was sold on a cybercrime forum, pitched particularly to Zeus trojan customers given its capabilities to re-use that trojan's form grabbing templates …
Darren Pauli, 15 Jul 2014
PCS with a red X in front of them

Swiping your card at local greengrocers? Miscreants will swipe YOU in a minute

More than a thousand point-of-sale, grocery management and accounting systems worldwide have been compromised by a new strain of malware, results of a March 2014 probe have revealed. During a survey of compromised POS terminals, accounting systems and grocery management platforms, the Nemanja botnet was fingered as one of the …
John Leyden, 27 May 2014
iPhone 5C purported

Fancy a new iPhone 5C or 5S? READ THIS or you may not get 4G data

Apple might have launched two new iPhone models on Tuesday, but it launched 10 different variants as Cupertino struggles to cope with the hugely fragmented 4G market. Where a GSM phone might be dual-band or the frequent flyer might shell out for a quad-band handset, Apple's latest phones each come in five variants: two hendeca- …
Bill Ray, 11 Sep 2013
Parliament in the clouds

Oracle emerges from bureaucratic sludge clutching crucial cloud certificate

Oracle has gained a crucial federal certification that will make it easier for US government agencies to buy cloud services from the database giant. The company announced it had gained a provisional authority to operate under the Federal Risk and Authorization Management Program (FedRAMP) on Thursday, almost a year after cloud …
Jack Clark, 22 May 2014

First China banned Bitcoin. Now its crooks are using malware to steal traders' wallets

Cybercrooks have developed a strain of malware that actively targets BTC China and other Bitcoin exchanges. A Zeus P2P/Gameover variant discovered by Trusteer is designed to steal the passwords of traders in the virtual currency. A blog post by the IBM-owned transaction security firm (extract below) explains that the malware is …
John Leyden, 19 Dec 2013
Adidas Brazuca World Cup ball

Balls to the World Cup: Brazuca wins in the wind

In soccer, the ball matters: Japanese boffins say the new six-panel design to be used in the 2014 FIFA World Cup is the most stable and predictable in many a long year. Of course, the balls used in the World Cup are nothing like what oldsters like this correspondent would recognise. The old-style ball has long been replaced at …

Failover in FOUR SECONDS? HP's SAP-specific iron hits the streets

HP has added two SAP-specific implementation to its ConvergedSystem product line: the CS900 for enterprise customers, and the CS500 for the smaller shop. The pitch from HP is that with a configuration purpose-built for different application environments, it can get customers firing with new servers, without the sysadmin having …
Money image

Aerospike: Thanks for that $20m, VCs ... next we'll OPEN SOURCE our NoSQL database

Startup Aerospike has guzzled $20m in filthy valley lucre. And it'll use the cash to fund its assault on database incumbents, namely making its flash-oriented NoSQL software open source. The company told The Reg on Tuesday that this is not some crazy plan: its decision to publish its database server code under the AGPL license, …
Jack Clark, 24 Jun 2014
Space Gray!

Apple ships new iPods in 'SPAAAAACE ... Gray'

Apple has quietly updated several of its iPod media players with a new color option to match its latest flagship smartphone, the iPhone 5S. The new mobe, which debuted at a media event in Cupertino on Tuesday, comes in three different color schemes: the rather prosaic Silver and Gold, and the oddly named "Space Gray". Now a few …
Neil McAllister, 11 Sep 2013
IBM 'through-silicon via' stacked chips

Calxeda co-founder unleashs 48-core ARM SoC

ARM vendor Cavium has revealed 48-core silicon it reckons will pitch it into high-end data centre and server apps. Cavium has hired Larry Wikelius, co-founder of failed ARM server silicon vendor Calxeda, and his former colleague Gopal Hegde (who played a part in creating Cisco's UCS servers). Both are insistent that now is the …
Boeing 787 Dreamliner on the tarmac in United livery

Boeing CEO says no more 'moonshots' after 787 Dreamliner ordeal

After weathering a decade of delays, cost overruns, and technical difficulties with its latest high-tech aircraft, Boeing CEO James McNerney says the company isn't planning any more ambitious gambles like the 787 Dreamliner, but will instead focus on cutting costs and increasing production. According to a report by the Seattle …
Neil McAllister, 22 May 2014

Amazon loads Docker app containerization into its cloud

Although admins have been free to run Linux containerization technology Docker on top of Amazon Linux running on its rentable EC2 servers for some time, the company on Thursday announced that Docker had been integrated with Elastic Beanstalk. Elastic Beanstalk is a platform-as-a-service technology from Amazon which lets …
Jack Clark, 23 Apr 2014
Cloud security

Cloud vid wrangler Zencoder STRADDLES Amazon and Google

Cloud video encoder Zencoder has taken a deep breath and gingerly straddled two cloud providers in an attempt to offer customers greater infrastructure choice. The Brightcove-owned firm announced support for Google's just-released Google Compute Engine on Monday, giving Chocolate Factory aficionados access to a new …
Jack Clark, 10 Dec 2013
balaclava_thief_burglar

Boss at 'Microsoft' scam support biz told to cough £000s in comp

A fraudster who conned consumers, particularly silver surfers, into parting with cash to fix phantom PC bugs was handed a suspended sentence on Friday and ordered to pay thousands of pounds in costs and compensation. The national e-crime squad based in Yorkshire, together with ActionFraud, brought the case against Mohammed …
Paul Kunert, 31 Mar 2014
The Register breaking news

Trying to kill undead Pushdo zombies? Hard luck, Trojan is EVOLVING

The crooks behind the Pushdo botnet agent have developed variants of the malware that are more resistant to take-down attempts or hijacking by rival hackers. Dell SecureWorks and Damballa warned (PDF) on Wednesday that the latest variant of Pushdo comes packed with a fallback mechanism for cases where zombie clients are unable …
John Leyden, 17 May 2013
Red Hat OpenShift logo

Don't be shy, we know you've got .NET code. Why not run it on our Linux cloud – Red Hat

Red Hat plans to welcome Microsoft Windows .NET workloads onto its on-premises app-hosting cloud OpenShift Origin – as it attempts to close the gap between its technology and Pivotal's Cloud Foundry. The upgrade was announced on Wednesday by Red Hat, which will work with Uhuru Software to bring .NET and SQL Server support to its …
Jack Clark, 05 Mar 2014

What's in it for server buyers now that Intel's Xeon E5-2600 v2 is here?

Autumn is on its way and Intel has released the "Ivy Bridge-EP" Xeon E5-2600 v2 server processors just in time to get in line for a chunk of the remaining 2013 IT budget at the data centers of the world. So how are these new processors going to stack up to the existing "Sandy Bridge-EP" Xeon E5-2600 v1 chips, and what can …
Iphone_hard_case

Put down that iPad! Snoopware RECORDS your EVERY gesture, TAP on iOS, Android

A security researcher has developed a proof-of-concept malware capable of capturing the actions of users on touchscreen devices. Senior security consultant Neal Hindocha and his colleagues at Trustwave were able to brew up similar strains of prototype malicious code for both rooted Android and jailbroken iOS devices. The line of …
John Leyden, 05 Feb 2014

Kinky Android X-ray app laid bare as malware

Japanese mobile users are being warned not to download an Android app promising to allow them to see through clothes with the phone’s camera, as the malware hidden within will steal address book data and try to blackmail them to the tune of ¥29,000 (£202). The app's first manifestation is usually an SMS message appearing to come …
Phil Muncaster, 20 Mar 2013
Gemini X-series

Hey, Nimbus Data. What you doin' with those 4TB flash slabs? Making a 96TB box? We KNEW it!

Nimbus Data has announced a 10-node clustered all-flash array that can store up to 96TB in a single box. The Gemini X-series all-flash arrays build on the current Gemini F-series arrays, which come in F610/F620 variants with 56/40/20 Gbit/s InfiniBand and 40/10/1 Gbit/s Ethernet, and the F410/F420 which lack InfiniBand and use …
Chris Mellor, 04 Mar 2014
Pledging fealty

We're making TOO MUCH CASH, say CryptoLocker scum in ransom price cut

The soaring price of BitCoin has prompted the cybercrooks behind the infamous CryptoLocker malware to reduce the levy they impose on victims from 2 BTC to 0.5 BTC. The reduced price scam was spotted in variants of the malware, which encrypts personal files on infected Windows PCs, spotted earlier this week by security firm F- …
John Leyden, 25 Nov 2013
The Register breaking news

Seoul-blackening disk wipe badness linked to 4-year SPY CAMPAIGN

The March attack that hit tens of thousands of computers in South Korea was part of a much larger campaign waged against the Asian nation since at least 2009. That's according to a new report by security biz McAfee. About 30,000 PCs in banks, insurance companies and TV stations were knackered a few months ago on 20 March in an …
John Leyden, 11 Jul 2013
Dogecoin

Hackers force innocent mobes to join ALTCOIN MINING GANGS

Cybercrooks are turning smartphones into digital currency-mining bots using mobile malware. The cyber-menace, dubbed CoinKrypt by mobile security firm Lookout, is capable of hijacking the processor on smartphones to mine digital currency, enriching hackers in the process. CoinKrypt has been confined thus far to Spanish pirated …
John Leyden, 27 Mar 2014
Lamport

Byzantine Generals co-boffin Lamport bags CompSci's 'Nobel prize'

Distributed systems researcher Leslie Lamport has been awarded the A.M. Turing award, computer science's equivalent to the Nobel Prize. The award for 2013 was given to Lamport "for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems." Another way of putting it is: no Lamport …
Jack Clark, 18 Mar 2014
The Register breaking news

Cyber-007 MiniDuke stalked Europe for at least 21 MONTHS

MiniDuke, the recently discovered cyber-spy malware aimed at governments and their agencies in Europe and elsewhere, has been operating for at least 21 months. A sample of the software nasty, discovered by researchers at Romanian antivirus firm Bitdefender, dates back to at least 20 June, 2011. Later variants of the spying tool …
John Leyden, 05 Mar 2013
The Register breaking news

StoreOnce: HP issues patch

HP has advised The Register that a patch is now available for its StoreOnce storage systems. Yesterday, we reported that a blogger with the handle Technion had identified an undocumented administrator account in some of its StoreOnce systems. He had also posted the hash of the password associated with the HPSupport account. …
Steam engine

Rackspace gives world the servers Google and Amazon keep secret

Troubled hosting company Rackspace has brewed up a life-saving potion based around the secret technologies developed by some of the web's giants. That project, "OnMetal Servers", gives customers the option of renting dedicated hardware from Rackspace based on designs similar to the secret servers operated by Google and Amazon, …
Jack Clark, 19 Jun 2014
Motorola G at GSM Arena

Is it TRUE what they say about the 'Moto G'? We FIND OUT on the 13th

Google-owned Motorola’s rumoured lower-cost alternative to the top-of-the-range Moto X looks set to arrive in time for Santa to drop it down a few of the world’s chimneys this year. A suitably seasonal promotion card scanned and then posted on GSM Arena by a punter who claims to have found a batch about to be sent to Phones4u …
Tony Smith, 04 Nov 2013
John Robinson's Home Lab

Home lab operators: Ditch your servers ... now!

At last year's Melbourne VMware user group (VMUG) conference, VMware's Mike Laverick opined that IT pros need a home lab these days, because bosses have stopped shelling out for training. Plenty of you agreed with that proposition. Some even showed us their very own home labs. Most used old servers, an arrangement that this …
Simon Sharwood, 12 Feb 2014

Mobe-makers' BLOATWARE is Android's Achilles heel

Android's Achilles Heel is not Google, but vendors who pack their devices chock-full of dodgy software. That's the conclusion reached by North Carolina State University researchers led by Xuxian Jiang, who has spent some time analysing Android security. In the latest work, co-authored with Lei Wu, Michael Grace, Yajin Zhou and …
Red Hat Shadowman logo

Red Hat teams up with community-based RHEL lookalike CentOS

Enterprise Linux vendor Red Hat has announced a new partnership with the CentOS Project aimed at developing new versions of the community-developed CentOS Linux distribution that take advantage of the latest open-source technologies. "Today is an exciting day for the open-source community," Red Hat CTO Brian Stevens said in a …
Neil McAllister, 08 Jan 2014
BigFoot 4U Object chassis and rack

Scality slips its Ring around Kinetic drives

Scality is developing its RING object storage system to use Seagate’s Kinetic drives. These drives implement an on-board key/value store and are directly accessed over Ethernet using Get and Put requests. Each drive has two 1Gbit/s Ethernet ports. Scality’s RING storage uses scale-out nodes that can grow to multi-petabyte …
Chris Mellor, 01 Apr 2014
counterintelligence_foriegn_spies

Security researchers uncover three-year-old 'RUSSIAN SPYware'

Security researchers have discovered a complex and sophisticated piece of data-stealing malware they suggest may well be the work of state-sponsored hackers in Russia. The Uroburos rootkit, named after a mythical serpent or dragon that ate its own tail – and a sequence of characters concealed deep within the malware’s code ( …
John Leyden, 04 Mar 2014

ZeuS KICKS that SaaS: Trojan raids Salesforce.com accounts

Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com. The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com. The …
John Leyden, 26 Feb 2014

Wilocity uncloaks 4.6Gb/sec Wi-Fi for next year's smartphones

Wilocity, pioneers of high-speed "WiGig" 60GHz Wi-Fi, has used the Mobile World Congress in Barcelona as the debutant ball for its 4.6Gb/sec chip for smartphones, formerly codenamed "Sparrow" and now formally dubbed Wil6300. "The huge performance boost offered by 802.11ad, operating in the 60GHz band, combined with massive …
Rik Myslewski, 25 Feb 2014
Microsoft CEO Satya Nadella

So whither Microsoft? If Nadella knows, he is keeping it well hidden

After Microsoft’s mega jobs bloodbath, we’re still not much wiser about what Microsoft will look like in five years' time. Steve Ballmer turned the focus from PCs to devices and services – manufacturing its own devices, and promoting its own services regardless of the platform. Satya Nadella was supposed to bring further clarity …
Andrew Orlowski, 21 Jul 2014
secondary age school kids outside NBN truck

Turnbull's NBN is startup-land's litmus test

Opponents of the Australian government's policy to build a National Broadband Network (NBN) with anything other than fibre-to-the-premises (FTTP) came up well and truly empty last week. The 270,000+ signatures amassed in support of the the cause on change.org, while an impressive demonstration of activism, were ignored. I …
Simon Sharwood, 16 Dec 2013

Biz bods, politicos, beware: 'BOTS are on the loose, and they're coming for YOU

Businesses and governments in the US, UK, Canada, and India are under assault from a malware-based cybercrime campaign using the Tor anonymizing relay network to hide its authors, say infosec researchers. A strain of malware called Mevade, previously blamed for a massive Tor traffic spike is being used to compromise systems at …
John Leyden, 25 Oct 2013
Diver peers through sub window. credit: Alexander Rist  http://www.sxc.hu/profile/OwnMoment

Swollen-bellied Riverbed spears trout of doubt: Opnet buyout blues over

Riverbed, the WAN optimising and cloud storage gateway biz, has announced a sparkling new Steelhead appliance and pretty shiny results as it recovers from digesting an acquisition. Which first? Let’s go for the revenues and earnings. Fourth quarter 2013 revenues were $283m – satisfying growth compared to revenues of $262m in the …
Chris Mellor, 18 Feb 2014
The Register breaking news

Cyberthugs put YOUR PC to work as Bitcoin-mining SLAVE

The recent volatility in the value of Bitcoins hasn't prevented cybercriminals from cooking up new ways to distribute malware engineered to mine the currency using compromised computers. Security researchers at ThreatTrack Security have uncovered examples where the infamous Blackhole exploit kit is being used to distribute a …
John Leyden, 18 Apr 2013
Printed key

New design flaw found in crypto's TLS: Pretend to be a victim online

Security researchers have developed a new man-in-the-middle attack against the cryptographic protocol TLS – a protocol that is used to encrypt online banking and shopping, and other sensitive connections, to thwart eavesdroppers. The so-called Triple Handshake attack can, in certain conditions, outwit vital checks carried out to …
John Leyden, 05 Mar 2014

German freemail firms defend AdBlock-nobbling campaign

German freemail sites deny attempting to "trick" Firefox and Chrome users into disabling AdBlock, the popular ad blocking browser add-on. Last week security blogger Michael Büker accused web.de and gmx.net of using what he claimed were "deceptive techniques" in order to hoodwink Firefox and Chrome users into removing AdBlock and …
John Leyden, 03 Mar 2014