Feeds

Articles about Variants

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014
iPhone 5C purported

Fancy a new iPhone 5C or 5S? READ THIS or you may not get 4G data

Apple might have launched two new iPhone models on Tuesday, but it launched 10 different variants as Cupertino struggles to cope with the hugely fragmented 4G market. Where a GSM phone might be dual-band or the frequent flyer might shell out for a quad-band handset, Apple's latest phones each come in five variants: two hendeca- …
Bill Ray, 11 Sep 2013

First China banned Bitcoin. Now its crooks are using malware to steal traders' wallets

Cybercrooks have developed a strain of malware that actively targets BTC China and other Bitcoin exchanges. A Zeus P2P/Gameover variant discovered by Trusteer is designed to steal the passwords of traders in the virtual currency. A blog post by the IBM-owned transaction security firm (extract below) explains that the malware is …
John Leyden, 19 Dec 2013
Space Gray!

Apple ships new iPods in 'SPAAAAACE ... Gray'

Apple has quietly updated several of its iPod media players with a new color option to match its latest flagship smartphone, the iPhone 5S. The new mobe, which debuted at a media event in Cupertino on Tuesday, comes in three different color schemes: the rather prosaic Silver and Gold, and the oddly named "Space Gray". Now a few …
Neil McAllister, 11 Sep 2013
Cloud security

Cloud vid wrangler Zencoder STRADDLES Amazon and Google

Cloud video encoder Zencoder has taken a deep breath and gingerly straddled two cloud providers in an attempt to offer customers greater infrastructure choice. The Brightcove-owned firm announced support for Google's just-released Google Compute Engine on Monday, giving Chocolate Factory aficionados access to a new …
Jack Clark, 10 Dec 2013
balaclava_thief_burglar

Boss at 'Microsoft' scam support biz told to cough £000s in comp

A fraudster who conned consumers, particularly silver surfers, into parting with cash to fix phantom PC bugs was handed a suspended sentence on Friday and ordered to pay thousands of pounds in costs and compensation. The national e-crime squad based in Yorkshire, together with ActionFraud, brought the case against Mohammed …
Paul Kunert, 31 Mar 2014
Red Hat OpenShift logo

Don't be shy, we know you've got .NET code. Why not run it on our Linux cloud – Red Hat

Red Hat plans to welcome Microsoft Windows .NET workloads onto its on-premises app-hosting cloud OpenShift Origin – as it attempts to close the gap between its technology and Pivotal's Cloud Foundry. The upgrade was announced on Wednesday by Red Hat, which will work with Uhuru Software to bring .NET and SQL Server support to its …
Jack Clark, 05 Mar 2014
Iphone_hard_case

Put down that iPad! Snoopware RECORDS your EVERY gesture, TAP on iOS, Android

A security researcher has developed a proof-of-concept malware capable of capturing the actions of users on touchscreen devices. Senior security consultant Neal Hindocha and his colleagues at Trustwave were able to brew up similar strains of prototype malicious code for both rooted Android and jailbroken iOS devices. The line of …
John Leyden, 05 Feb 2014
The Register breaking news

Trying to kill undead Pushdo zombies? Hard luck, Trojan is EVOLVING

The crooks behind the Pushdo botnet agent have developed variants of the malware that are more resistant to take-down attempts or hijacking by rival hackers. Dell SecureWorks and Damballa warned (PDF) on Wednesday that the latest variant of Pushdo comes packed with a fallback mechanism for cases where zombie clients are unable …
John Leyden, 17 May 2013

What's in it for server buyers now that Intel's Xeon E5-2600 v2 is here?

Autumn is on its way and Intel has released the "Ivy Bridge-EP" Xeon E5-2600 v2 server processors just in time to get in line for a chunk of the remaining 2013 IT budget at the data centers of the world. So how are these new processors going to stack up to the existing "Sandy Bridge-EP" Xeon E5-2600 v1 chips, and what can …
Gemini X-series

Hey, Nimbus Data. What you doin' with those 4TB flash slabs? Making a 96TB box? We KNEW it!

Nimbus Data has announced a 10-node clustered all-flash array that can store up to 96TB in a single box. The Gemini X-series all-flash arrays build on the current Gemini F-series arrays, which come in F610/F620 variants with 56/40/20 Gbit/s InfiniBand and 40/10/1 Gbit/s Ethernet, and the F410/F420 which lack InfiniBand and use …
Chris Mellor, 04 Mar 2014
Pledging fealty

We're making TOO MUCH CASH, say CryptoLocker scum in ransom price cut

The soaring price of BitCoin has prompted the cybercrooks behind the infamous CryptoLocker malware to reduce the levy they impose on victims from 2 BTC to 0.5 BTC. The reduced price scam was spotted in variants of the malware, which encrypts personal files on infected Windows PCs, spotted earlier this week by security firm F- …
John Leyden, 25 Nov 2013

Kinky Android X-ray app laid bare as malware

Japanese mobile users are being warned not to download an Android app promising to allow them to see through clothes with the phone’s camera, as the malware hidden within will steal address book data and try to blackmail them to the tune of ¥29,000 (£202). The app's first manifestation is usually an SMS message appearing to come …
Phil Muncaster, 20 Mar 2013
Dogecoin

Hackers force innocent mobes to join ALTCOIN MINING GANGS

Cybercrooks are turning smartphones into digital currency-mining bots using mobile malware. The cyber-menace, dubbed CoinKrypt by mobile security firm Lookout, is capable of hijacking the processor on smartphones to mine digital currency, enriching hackers in the process. CoinKrypt has been confined thus far to Spanish pirated …
John Leyden, 27 Mar 2014
Lamport

Byzantine Generals co-boffin Lamport bags CompSci's 'Nobel prize'

Distributed systems researcher Leslie Lamport has been awarded the A.M. Turing award, computer science's equivalent to the Nobel Prize. The award for 2013 was given to Lamport "for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems." Another way of putting it is: no Lamport …
Jack Clark, 18 Mar 2014
The Register breaking news

Seoul-blackening disk wipe badness linked to 4-year SPY CAMPAIGN

The March attack that hit tens of thousands of computers in South Korea was part of a much larger campaign waged against the Asian nation since at least 2009. That's according to a new report by security biz McAfee. About 30,000 PCs in banks, insurance companies and TV stations were knackered a few months ago on 20 March in an …
John Leyden, 11 Jul 2013
The Register breaking news

Cyber-007 MiniDuke stalked Europe for at least 21 MONTHS

MiniDuke, the recently discovered cyber-spy malware aimed at governments and their agencies in Europe and elsewhere, has been operating for at least 21 months. A sample of the software nasty, discovered by researchers at Romanian antivirus firm Bitdefender, dates back to at least 20 June, 2011. Later variants of the spying tool …
John Leyden, 05 Mar 2013
The Register breaking news

StoreOnce: HP issues patch

HP has advised The Register that a patch is now available for its StoreOnce storage systems. Yesterday, we reported that a blogger with the handle Technion had identified an undocumented administrator account in some of its StoreOnce systems. He had also posted the hash of the password associated with the HPSupport account. …
Motorola G at GSM Arena

Is it TRUE what they say about the 'Moto G'? We FIND OUT on the 13th

Google-owned Motorola’s rumoured lower-cost alternative to the top-of-the-range Moto X looks set to arrive in time for Santa to drop it down a few of the world’s chimneys this year. A suitably seasonal promotion card scanned and then posted on GSM Arena by a punter who claims to have found a batch about to be sent to Phones4u …
Tony Smith, 04 Nov 2013
John Robinson's Home Lab

Home lab operators: Ditch your servers ... now!

At last year's Melbourne VMware user group (VMUG) conference, VMware's Mike Laverick opined that IT pros need a home lab these days, because bosses have stopped shelling out for training. Plenty of you agreed with that proposition. Some even showed us their very own home labs. Most used old servers, an arrangement that this …
Simon Sharwood, 12 Feb 2014

Mobe-makers' BLOATWARE is Android's Achilles heel

Android's Achilles Heel is not Google, but vendors who pack their devices chock-full of dodgy software. That's the conclusion reached by North Carolina State University researchers led by Xuxian Jiang, who has spent some time analysing Android security. In the latest work, co-authored with Lei Wu, Michael Grace, Yajin Zhou and …
BigFoot 4U Object chassis and rack

Scality slips its Ring around Kinetic drives

Scality is developing its RING object storage system to use Seagate’s Kinetic drives. These drives implement an on-board key/value store and are directly accessed over Ethernet using Get and Put requests. Each drive has two 1Gbit/s Ethernet ports. Scality’s RING storage uses scale-out nodes that can grow to multi-petabyte …
Chris Mellor, 01 Apr 2014
Red Hat Shadowman logo

Red Hat teams up with community-based RHEL lookalike CentOS

Enterprise Linux vendor Red Hat has announced a new partnership with the CentOS Project aimed at developing new versions of the community-developed CentOS Linux distribution that take advantage of the latest open-source technologies. "Today is an exciting day for the open-source community," Red Hat CTO Brian Stevens said in a …
Neil McAllister, 08 Jan 2014
counterintelligence_foriegn_spies

Security researchers uncover three-year-old 'RUSSIAN SPYware'

Security researchers have discovered a complex and sophisticated piece of data-stealing malware they suggest may well be the work of state-sponsored hackers in Russia. The Uroburos rootkit, named after a mythical serpent or dragon that ate its own tail – and a sequence of characters concealed deep within the malware’s code ( …
John Leyden, 04 Mar 2014

ZeuS KICKS that SaaS: Trojan raids Salesforce.com accounts

Miscreants have forged a variant of the infamous ZeuS banking Trojan that targets enterprise data held by clients of CRM giant Salesforce.com. The ZeuS variant does not exploit a vulnerability in the Salesforce.com platform itself but rather penetrates the insecure devices of corporate workers accessing Salesforce.com. The …
John Leyden, 26 Feb 2014

Wilocity uncloaks 4.6Gb/sec Wi-Fi for next year's smartphones

Wilocity, pioneers of high-speed "WiGig" 60GHz Wi-Fi, has used the Mobile World Congress in Barcelona as the debutant ball for its 4.6Gb/sec chip for smartphones, formerly codenamed "Sparrow" and now formally dubbed Wil6300. "The huge performance boost offered by 802.11ad, operating in the 60GHz band, combined with massive …
Rik Myslewski, 25 Feb 2014
Diver peers through sub window. credit: Alexander Rist  http://www.sxc.hu/profile/OwnMoment

Swollen-bellied Riverbed spears trout of doubt: Opnet buyout blues over

Riverbed, the WAN optimising and cloud storage gateway biz, has announced a sparkling new Steelhead appliance and pretty shiny results as it recovers from digesting an acquisition. Which first? Let’s go for the revenues and earnings. Fourth quarter 2013 revenues were $283m – satisfying growth compared to revenues of $262m in the …
Chris Mellor, 18 Feb 2014
secondary age school kids outside NBN truck

Turnbull's NBN is startup-land's litmus test

Opponents of the Australian government's policy to build a National Broadband Network (NBN) with anything other than fibre-to-the-premises (FTTP) came up well and truly empty last week. The 270,000+ signatures amassed in support of the the cause on change.org, while an impressive demonstration of activism, were ignored. I …
Simon Sharwood, 16 Dec 2013
Printed key

New design flaw found in crypto's TLS: Pretend to be a victim online

Security researchers have developed a new man-in-the-middle attack against the cryptographic protocol TLS – a protocol that is used to encrypt online banking and shopping, and other sensitive connections, to thwart eavesdroppers. The so-called Triple Handshake attack can, in certain conditions, outwit vital checks carried out to …
John Leyden, 05 Mar 2014

German freemail firms defend AdBlock-nobbling campaign

German freemail sites deny attempting to "trick" Firefox and Chrome users into disabling AdBlock, the popular ad blocking browser add-on. Last week security blogger Michael Büker accused web.de and gmx.net of using what he claimed were "deceptive techniques" in order to hoodwink Firefox and Chrome users into removing AdBlock and …
John Leyden, 03 Mar 2014

Biz bods, politicos, beware: 'BOTS are on the loose, and they're coming for YOU

Businesses and governments in the US, UK, Canada, and India are under assault from a malware-based cybercrime campaign using the Tor anonymizing relay network to hide its authors, say infosec researchers. A strain of malware called Mevade, previously blamed for a massive Tor traffic spike is being used to compromise systems at …
John Leyden, 25 Oct 2013
Prison window

Prison Locker: A load of überhyped malware FUD over... internet chatter

An underground advert seeking help in developing a file-encrypting ransomware kit that might be sold for just $100 a go sparked something of a panic on the interwebs this week. But security watchers are yet to see any samples of the so-called Prison Locker ransomware, leading at least two security firms to characterise the …
John Leyden, 10 Jan 2014
The Register breaking news

Cyberthugs put YOUR PC to work as Bitcoin-mining SLAVE

The recent volatility in the value of Bitcoins hasn't prevented cybercriminals from cooking up new ways to distribute malware engineered to mine the currency using compromised computers. Security researchers at ThreatTrack Security have uncovered examples where the infamous Blackhole exploit kit is being used to distribute a …
John Leyden, 18 Apr 2013
The Register breaking news

Nasty nuke-lab data-slurper EVOLVES, now feeds off new Java hole

A piece of malware linked to attacks against governments and organisations involved in hi-tech industries such as space exploration and nuclear power has been adapted to exploit a recently uncovered Java security flaw. NetTraveler has been outfitted to exploit a recently patched Java bug as part of a watering-hole-style attack …
John Leyden, 05 Sep 2013
Intel cloud GM Jason Waxman sports shows off an Avoton Atom

Intel lifts veil on future 14nm Xeon, Atom server chips

Intel owns the data center, ­ or at least a large portion of it when it comes to servers - and wants to not only keep it that way. Chipzilla also wants big chunks of the adjacent networking and storage businesses. The company therefore hosted a day-long shindig with press and analysts today, complete with all the top brass from …
AMD logo

AMD tries to kickstart ARM-for-servers ecosystem

AMD today rolled the dice on a risky proposition: enthusiasm for ARM-powered servers in the data center. The announcement fleshes out what the vendor outlined last June. It's an idea that looks high-risk from several angles: the number of server vendors in the word has just shrunk again with Big Blue exiting the x86 server …

Intel carves up Xeon E5-2600 v2 chips for two-socket boxes

Companies with workloads that like to ride on lots of threads and cores are going to be able to get a lot more bang for a two-socket box thanks to the launch of the "Ivy Bridge-EP" Xeon E5-2600 v2 processors by Intel. Those with pesky applications that like faster clocks to get more work done, well, the process shrink is giving …

DeputyDog attack targets latest IE zero day

Security researchers have spotted two new targeted attack campaigns aimed at organisations in Japan, China and elsewhere in Asia, one of which exploits a zero day exploit in Internet Explorer revealed only last week. Operation DeputyDog is targeted at “entities in Japan”, using the IE vulnerability CVE-2013-3893 which Microsoft …
Phil Muncaster, 23 Sep 2013
The ConnectX-3 Pro server adapter from Mellanox

Mellanox adds VM-flitting to ConnectX-3 server adapters

Switch and adapter maker Mellanox Technologies added support for virtual LAN overlays to its Ethernet switches late last year and now it is building in support for the two primary overlays into its ConnectX-3 server adapters to match. Virtual LAN overlays make Layer 3 routing between networks invisible to those networks and look …

Ofcom flogs ex-military 4G spectrum, but ONLY the iPhone 5 can use it

A fresh round of 4G spectrum auctions are in the offing as Ofcom proposes selling off surplus military frequencies at 2.3GHz and 3.4GHz, despite the fact that only the iPhone 5 can make any use of it. Another 190MHz of 4G spectrum will be up for grabs next year after being discarded by the military and heading for the auction …
Bill Ray, 17 Oct 2013

Oracle fires up Virtual Compute Appliance for infrastructure clouds

If you are looking for one throat to choke for a virtualized x86 server stack, the right one is tough to find. But Oracle wants you to wrap your hands around Larry Ellison's neck, and is betting that its new Virtual Compute Appliance works so well and is such a good bargain that you won't squeeze. The system makers that have …
RIM BlackBerry PlayBook

RIM doses PlayBook with 4G super serum

In a bid to improve the flavour of its chunky 7in tablet and make it more tasty for punters, RIM has spiced up its PlayBook with a little 4G LTE sauce. Essentially an existing PlayBook but with added faster mobile broadband tech and a clocked-up processor, the "4G LTE BlackBerry PlayBook" - to give it its full name - goes on …
Tony Smith, 02 Aug 2012
balaclava_thief_burglar

'Neverquest' bank-robber 'ware throws the whole Trick Book at victims

A new banking trojan that its creators brag can attack “any bank in any country” has already been blamed for several thousand attempts to infect computers. The Neverquest banking trojan supports almost every trick used to bypass online banking security systems, including web injection, remote system access and social engineering …
John Leyden, 29 Nov 2013
The Register breaking news

Stealthy, malware-spewing server attack not limited to Apache

A mysterious backdoor that has been used to drive traffic to malicious websites may be more widespread than previously thought, security researchers say, and it affects more web servers than just Apache. The malware – which has been dubbed "Linux/Cdorked.A" or "Darkleech," depending whom you ask – was first spotted in the wild …
Neil McAllister, 08 May 2013

Late with your ransom payment? Never mind, CryptoLocker crooks will, er, give you a break

Crybercrooks behind the infamous file-encrypting CryptoLocker ransomware have begun offering a late payment option, which costs victim five times as much to "buy" the decryption key necessary to unscramble their encrypted files. Previously, victims who failed to pay a $300+ ransom (up to 2 Bitcoins, $460) within three days would …
John Leyden, 05 Nov 2013
Data Center GM Diane Bryant and an Avoton microserver

Intel chases network gear and cold storage with Avoton Atoms

The "Avoton" Atoms for servers and storage arrays and their "Rangeley" variants for networking devices are out and Intel is ramping up the features and carving up the SKUs to try to chase the low end of servers, storage, and networking to take some business away from other chip makers. Does Intel have what it takes to upset the …
IDC object storage marketscape

IDC's explicit snapshot: Everyone who's anyone in object storage: In 3D

Analyst IDC has ranked object storage suppliers in a pretty 3D marketscape chart, and Cleversafe leads the pack. A marketscape chart, apparently, is a four-box diagram with wavy edges and overlapping boxes, labelled Participants, Contenders, Major Players and Leaders. It positions vendors on two axes; the upright one is …
Chris Mellor, 27 Nov 2013

Iomega: SOHO punters will pay hard cash for our cheap boxes

Networked storage is not just for enterprise buyers. The wee consumer arm of storage-and-networking giant EMC says that small office and home office (SOHO) and small and medium business customers have bought more than a million of its StorCenter networked storage boxes. Iomega is an EMC business unit focused on selling external …
Chris Mellor, 04 Sep 2012
The Register breaking news

Bagle variants served up with spam

Spamming tactics are being used to distribute multiple versions of a new Trojan. The malware is similar to the Bagle email worm except for the absence of email spreading functionality. Most of the samples seen so far include a ZIP attachment which, when opened, includes a program file named "doc_01.exe" or "prs_03.exe", or some …
John Leyden, 01 Mar 2005
padlock

Didn't have time to ask about it in our security Regcast? No problem

Our Regcast Security: Knowing what you don't know - and what you can do about it (on demand version here) brought together Raimund Genes, CTO of Trend Micro, and Freeform Dynamics' Tony Lock, chief security nagging officer of the analyst community. They gave us a fascinating insight into how the security landscape has changed …
Tim Phillips, 11 Apr 2014