Articles about Variants

Hacker launches ransomware rescue kit

Security bod Jada Cyrus has compiled a ransomware rescue kit to help victims decrypt locked files and avoid paying off crooks. The kit sports removal tools for common ransomware variants along with guides for how to perform the necessary tasks. Cyrus recommends users not pay ransoms as doing so sustains the criminal business …
Darren Pauli, 21 May 2015
CN72/73xx Block Diagram

Cavium adds 4/16 core SoCs

Cavium is filling out a scale gap in its Octeon III system-on-a-chip (SoC) range with he four-to-sixteen core CN72xx and CN73xx variants that are pin-compatible with the rest of the range. The MIPS64-based SoCs are low-power network processors pitched between the one-to-four core CN71xx and the 24-48 CN78xx range. The chips can …
CloudSpeed_Eco_Gen_2

SanDisk speeds up CloudSpeed Eco, raises capacity

SanDisk has souped up its CloudSpeed Eco SSD for cloud service providers, doubling its capacity and raising throughput, courtesy of a process shrink. CloudSpeed Eco Gen 1 was introduced at the end of March last year as a cost-effective SSD for cloud service provider use. It was built using a 19nm chip process and held up to …
Chris Mellor, 01 Jun 2015

Blackhats using mystery Magento card stealers

Sucuri infosec researcher Peter Gramantik says carders are exploiting an unknown vulnerability to steal billing information from e-commerce sites that use eBay's Magento platform. Gramantik found an attack script that plunders POST data and identifies valuable payment data before storing it as an encrypted image file. He says …
Darren Pauli, 29 Jun 2015
Dell SCv2000 storage array

Compellent kicks EqualLogic out of Dell's bottom end: New SCv2000

When Dell acquired EqualLogic and later Compellent, it used the former brand for its low-end storage and the latter for its bigger bit boxen. The company's now booted EqualLogic out of the bottom end with the new entry-level SCv2000, a US$14,000 array that does everything a larger Compellent does, but for less. Dell hasn't yet …
Simon Sharwood, 06 May 2015
Ransom note saying "Pay Up" in blackmail type

Android ransomware poses as FBI smut warning

Cybercrooks have launched a new wave of Android ransomware that poses as a pretty convincing FBI-imposed porn-surfing warning. Over 15,000 spam emails, including zipped files, have hit the inboxes of Android users in recent days, according to Romanian security software firm Bitdefender. If activated, the ransomware demands $500 …
John Leyden, 26 May 2015
Fujitsu TR800

Diamonds are forever, Fujitsu Eternus now for VDI

Fujitsu has added a bunch of new variants to its Eternus TR storage arrays, targeting large scale desktop virtualisation environments. The models are the Eternus TR820, TR850 and TR880, with the last in the list claiming the ability to connect 3,500 VMs, which the company says is nearly double the scale of its previous models. …
Team Register, 20 Jan 2015
Headshot of Trojan horse

Fareit trojan pwns punters with devious DNS devilry

DNS tricks used by the Fareit trojan mean users are tricked into downloading malware, seemingly from Google or Facebook The latest variants of Fareit are infecting systems via malicious DNS servers, Finnish security firm F-Secure warns. These servers push bogus Flash updates that actually come packed with malicious code, as a …
John Leyden, 06 Mar 2015
No Sale

PC sales dip below 2009 levels, with Japanese sales off 44 per cent

68.5 million PCs trundled off the world's production lines in 2015's first quarter, the lowest number since 2009 according to box-watcher IDC. The news isn't all bad: the analyst firm had previously predicted a lower number. But it's still a 6.7 per cent dip on last year's first quarter. Newer PC designs are exciting punters, …
Simon Sharwood, 10 Apr 2015
Zuck balloons

Facebook policy wonk growls at Europe's mass of data laws

Facebook's Brussels lobbyist Richard Allan took to the pages of the Pink 'Un on Wednesday morning to have a good old moan about "multiple" EU nations digging around the free content ad network's data-slurping biz practices. He complained that the actions of national privacy watchdogs within the 28-member-state bloc posed a …
Kelly Fiveash, 29 Apr 2015

Poison résumé attack gives ransomware a gig on the desktop

Security researchers are focussing their crosshairs on what appears to be high-volume spam and exploit campaigns to deliver the latest iteration of the Cryptowall ransomware. Boffins from the SANS Institute, Cisco, and MalwareBytes have identified a dangerous if goofy spam campaign slinging the nasty ransomware masquerading as …
Darren Pauli, 12 Jun 2015
Fake Apple Watch

Can't pay $349 for an Apple Watch? Get a Chinese knockoff for less than $50

China's legendary counterfeit craftsmen have been quick on the draw and are selling rip-off Apple Watch lookalikes for a fraction of the price, even though Cook & Co haven't shipped any devices as yet. "These guys are specialists," Laurent Le Pen, founder of Shenzhen smartwatch maker Omate, told CNN. "The speed at which they can …
Iain Thomson, 10 Mar 2015

We’re in bed together, admit Intel Security, Trend Micro and NCA

The UK's National Crime Agency has enlisted two leading security firms as part of a collaborative intelligence-sharing effort. Intel Security and Trend Micro will be part of the "virtual threat teams" which will provide the police with intelligence on cybercrime threats in the UK and the rest of the world. As both companies …

AT LAST: Australia gets its very own malware

Australians are being targeted by a new variant of the Carberp malware under what appears to be renewed criminal interest in the antipodes. The modified trojan, Carberp.C, was spread through a spam operation masquerading as a payment invoice. Virus writers pushed the malware out a day after coding it, Symantec researcher …
Darren Pauli, 19 Jan 2015
Intel sign by StockMonkeys.com

Intel's new chips are from 'Purley' – know what I mean? Know what I mean? Say no more

A presentation given at a conference on high-performance computing (HPC) in Poland earlier this month appears to have yielded new insight into Intel's Xeon server chip roadmap. A set of slides spotted by our sister site The Platform indicates that Chipzilla is moving toward a new server platform called "Purley" that will debut …
Neil McAllister, 27 May 2015

Cisco battles POODLE with a listicle and some twaddle

Cisco has joined the growing list of vendors scrambling a response to the POODLE vulnerability, with a number of systems confirmed vulnerable and more under investigation. The Borg's current POODLE status only clears one system: the Cisco Adaptive Security Device Manager. The company says its ongoing assessment of products for …
Headshot of Trojan horse

Vawtrak challenges almighty ZeuS as king of the botnets

Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned. Vawtrak currently ranks as the single most dangerous threat, according to PhishLabs. Only Zeus and its many variants (GameOver, KINS, ZeusVM, Zberp, etc.) taken as a single malware "family" would outrank …
John Leyden, 27 Dec 2014
Random numbers

'Bar Mitzvah attack' should see off ancient and crocked RC4 algo

Security boffin Itsik Mantin has found a new attack based on old weaknesses that is the first 'practical' attack on SSL that does not require man-in-the-middle to steal sensitive data from RC4 algorithms. The Imperva bod's research reveals a 13 year-old weakness in the superseded algorithm, which is known to be insecure but is …
Darren Pauli, 27 Mar 2015
management regulation1

Cisco slings small change at CSIRO over WiFi dispute

Australia's Commonwealth Scientific and Industrial Research Organisation (CSIRO) has wrapped up a loose end in its long-running patent arguments over WiFi, winning an American judgement against Cisco over royalty payments for CSIRO's technology. The long-standing argument wasn't over patent infringement – both parties agreed …
cloud

Extreme adds switches and partners

Extreme Networks has launched a quartet of switches and a management appliance, in what it says is an expansion of its software defined network (SDN) strategy. Back in June, the company launched its OpenStack SDN platform. That launch wrapped a bunch of API toolkits together with NetSight management and Purview optimisation …
Malware

Apple tries to kill iWorm: Zombie botnet feasting on Mac brains

Apple has updated its XProtect anti-malware system to squash several variants of the iWorm before the malware causes any further damage. The changes to the program XProtect.plist allows OSX to detect and block three species of iWorm, helpfully named OSX.iWorm.A, OSX.iWorm.B, and OSX.iWorm.C. XProtect is Apple's rudimentary …
Jasper Hamill, 06 Oct 2014
Haswell-E Motherboards

Intel's Haswell-E brain to emerge from the lab at end of August – reports

Intel has reportedly fixed a date to ship its octo-core Haswell-E processors and X99 Express chipset, with a Japanese outlet saying they will hit the shelves on August 29. Japan's Hermitage Akihabara says the high-end desktop silicon and associated motherboards have been brought forward a little from the expected September ship …
Osborne 1, second version - DRAM detail

Is that a graphics driver on your shop's register – or a RAM-slurping bank card thief?

Crooks are infecting sales registers running Oracle-owned MICROS software with malware tailor-fitted to steal bank card information from the machines. MalumPoS scrapes sensitive data from the RAM inside the tills, which are used in places from shops and restaurants to hotels and bars. The software nasty can be easily modified to …
John Leyden, 09 Jun 2015
More flaws found in Java

Azul tackles Oracle with open-source Java for Internet of Stuff

Azul Systems has added a new, ultra-compact entry to its portfolio of alternative Java environments, taking a run at Oracle for the lucrative mobile, embedded, and Internet of Things (IoT) markets. Zulu Embedded is a stripped-down sibling of Zulu, Azul's certified, cross-platform build of OpenJDK – Oracle's open source reference …
Neil McAllister, 25 Mar 2015

Bad romance: Ransomware, exploit kits in criminal cuddle

The lowlifes behind the Cryptowall ransomware seem to have decided it's no longer worth developing their own exploit kits. Instead, according to analysis by Cisco, they're relying on other popular exploits to distribute the malware. The ransomware was considered one of the most effective ransomware offerings that encrypted a …
Darren Pauli, 10 Feb 2015
Facebook's 6-pack

Hey, network giants: Facebook swigs from an 'open' 6-PACK of tech

Facebook has taken another step towards kicking the traditional switch vendors out of its network, setting their chassis-based switches in the cross-hairs. The Social NetworkTM has created a chassis and fabric for the Wedge switches it let loose on its data centres last year. Announced at today's Facebook Networking@Scale event …
Lego Godzilla

Intel raises memory deflector shields in Xeon E7 processor refresh

Intel has given its Xeon E7 processor family its annual refresh, this time emphasising analytics at scale. The new E7-8800/4800 v3 chips use the Haswell micro-architecture, meaning all Chipzilla's Xeons have made the jump. Intel's been a bit cagey, and did not share the list of E7 v3 models as we were going to press, but we're …
Simon Sharwood, 05 May 2015
HP

HP flicks white box switch: NOT a Facebook wannabe? Stuff our open kit in your cloud

Less than a week after Cisco's John Chambers dismissed the “white box” switch category, HP has entered that market with its own open architecture switches. The company wants to start with “web scale” cloud operators who don't want to imitate Facebook or Google and run up their own systems from scratch. However, according to CTO …

Please use TWO HANDS to access AdultFriendFinder

Four hosts are behind one in two typosquatting attacks against the top 500 websites, research has found. The hosts and their fellow fraudsters had registered domain names mimicking three-quarters of the internet's 500 most popular websites, say University of Leuven researchers Pieter Agten, Wouter Joosen, and Frank Piessens, who …
Darren Pauli, 16 Jan 2015
Headshot of Trojan horse

Banking trojan scourge gallops on, despite more fences

RSA 2015 Banking botnets persist as a threat despite recent high-profile takedowns which only achieve a temporary calming effect, according to a new study from Dell SecureWorks. Between mid-2014 and early 2015, coordinated efforts involving law enforcement and private-sector industry disrupted three of the most active banking botnets ( …
John Leyden, 23 Apr 2015
Cryptowall ransomware notice

KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION

Victims of the CryptoWall ransomware have been extorted out of at least $1m. Despite a takedown operation in June, CryptoWall continues to be the largest and most destructive ransomware threat on the internet, according to the latest analysis of the threat by security researchers from Dell SecureWorks Counter Threat Unit. …
John Leyden, 29 Aug 2014
Apple iPod Classic

Apple's ONE LESS THING: the iPod Classic disappears

Amid all the colour and movement generated by Tuesday's launch of new iPhones and the Apple Watch, Cupertino looks to have quietly killed the iPod Classic. A visit to www.apple.com/ipod/ or its national variants reveals a range of iPods that includes the iPod Shuffle, Nano and Touch, plus the Apple TV. But there's no mention of …
Simon Sharwood, 10 Sep 2014
Sean Connery in Dr. No

Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER

Amnesty and Privacy International are offering a free-of-charge spyware detection tool designed to help journalists and human rights activists stay one step ahead of government surveillance. The Windows-only Detekt anti-spyware tool is designed to be a supplement, rather than an alternative, to pre-existing anti-virus protection …
John Leyden, 20 Nov 2014

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014
Ultrastar_SSD1600MH

HGST polishes Ultrastar SSD whoppers, stuffs with denser Intel flash

HGST has refreshed its Ultrastar enterprise SSD line, using denser 20nm NAND to replace the previous 25nm flash, doubling capacity, upping read performance but lowering write performance a tad in the process. The starting point was a three-product Ultrastar SSD800 line-up, maxing out at 800GB and coming in MH (write-intensive), …
Chris Mellor, 28 Jul 2014
Intel Xeon

Intel's SECRET Xeons: tell us what you think Chipzilla's hiding

POLL At the Australian launch of Intel's new Xeon E5-2600 v3 yesterday, Chipzilla's local folks popped up a slide trumpeting the fact that the chip now comes in 35 special flavours. Your correspondent asked Intel to name a few, which prompted a response that pre-launch debate considered whether or not to include the slide because …
Simon Sharwood, 10 Sep 2014
Ciscoblood

Cisco denies plans to pull its cash out of VCE

Cisco has denied it will stop investing in VCE – the converged systems company financed by itself, EMC, and EMC sub VMware – following a report that appeared across the pond, citing unnamed sources. “Cisco is not pulling out of VCE,” the company’s senior PR manager, Gareth Pettigrew, said. “VCE customers and partners can be …
Chris Mellor, 09 Oct 2014
Ubuntu 15.04 screenshot

Ubuntu 15.04 to bring 'Vivid' updates for cloud, devices this week

Canonical says Ubuntu 15.04 "Vivid Vervet," the latest version of its popular Linux distro, will ship this week, following a two-month beta period. Along with the desktop version – which Canonical says is "the favorite environment for Linux developers" – the release will also deliver a range of variants, including special …
Neil McAllister, 22 Apr 2015
Flytrap

Use home networking kit? DDoS bot is BACK... and it has EVOLVED

A router-to-router bot first detected two years ago has evolved - and now has the capability to reconfigure the firewalls of its victims. The Lightaidra malware captured by security researcher TimelessP (@TimelessP) is an IRC-based mass router scanner/exploiter that's rare because it spreads through consumer network devices …
John Leyden, 09 Sep 2014

Dodgy installer drops Trojan in Japanese Buffalo update

Buffalo in Japan is red-faced after its Website shipped Trojan-infected Windows driver updates for a bunch of its peripherals, including broadband routers, home NAS, and Bluetooth mice. According to this notice (Google translation here), the installers were modified to include Infostealer.Bankeiya.B, which steals bank account …

Attackers fling Stuxnet-style RATs at critical control software in EUROPE

Security researchers have uncovered a series of Trojan-based attacks which have infiltrated several targets by infecting industrial control system software from the makers of SCADA and ICS systems. The majority of the victims are located in Europe, though at the time of writing at least one US firm's compromised gear appears to …
John Leyden, 26 Jun 2014
Chameleon

Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!

Suse has kicked out a new version of its enterprise-grade commercial Linux distribution, Suse Linux Enterprise 12, more than five years after the last major-version release. Not that the German firm has been resting on its laurels in the meantime. Countless patches and updates for the platform have been released for version 11 …
Neil McAllister, 28 Oct 2014
Land Rover in the Korean War

Land Rover's return: Last orders and leather seats for Defender nerds

We all know there’s only on one true Land Rover: the Defender. A cheerful, competent, boxy-shaped device that’s been in production since 1948, inspired by the Jeep, the Allies' WWII workhorse. It looks as good pulling logs from a forest as it does pulling up outside a house in Mayfair and it was voted Greatest Car of All Time by …
Fraud image

Webcam-snooping spawn of ZeuS hits 150 banks worldwide

The latest evolution of the online bank account raiding Trojan ZeuS is the webcam-spying Chthonic malware, according to researchers. Chthonic infects Windows PCs, and allows criminals to connect to the compromised PC remotely and command it to carry out fraudulent transactions. The software nasty is targeting customers of more …
John Leyden, 19 Dec 2014
management regulation1

Apple wheels out sueball cannon, again

Apple and Google might have decided on a ceasefire in their global patent mutually-assured-destruction battle, but Cupertino-versus-Korea continues to grind on. In its latest move, Apple has fired off two new sueballs: one seeks a permanent injunction preventing the sale of now nearly-obsolete Samsung products in the US; the …
Patrick McGoohan as The Prisoner in "Fall Out"

Joyent: Never mind those other forkers, Node.js has a foundation now, too

The popular, open source Node.js JavaScript runtime engine is getting a new foundation to manage its development, in a move that could help mend the recent schism in the project's community. To date, Node.js has been sponsored and overseen by Joyent, the infrastructure-as-a-service company where Ryan Dahl, the software's creator …
Neil McAllister, 10 Feb 2015

A brief introduction to converged infrastructure

Sometimes, it’s better to think inside the box. Bundling different IT components together into a single unit may just solve some of your computing problems, if you plan it right. Welcome to the world of IT convergence. Depending on which vendor or analyst you talk to, it’s known as an integrated system, a unified computing …
Robin Birtstone, 23 Jun 2015
twitchpokemon

Beware geeks bearing gifts: Steam-draining nasty spreads via Twitch

Infosec bods are warning of new malware spreading through game-streaming web hit Twitch: the software nasty subverts Steam accounts to drain player's wallets, and could take away all their precious weaponry. eskimo I've got 99 problems but a Twitch ain't one The malware spreads by bombarding users of Twitch's chat feature …
Iain Thomson, 12 Sep 2014
Zombie Zero

Infected Chinese inventory scanners ships off logistics intel

A Chinese manufacturer has been accused of implanting malware that steals supply chain intelligence in its hand-held scanner firmware. Security firm TrapX says infected scanners have been sold to eight unnamed firms including a large robotics company. Variants of the malware broke into enterprise resource planning platforms to …
Darren Pauli, 11 Jul 2014
Victorinox SwissFlash 8GB USB Memory Stick and Multi-Tool

Peak thumb drive is coming in 2016

Peak thumb drive is upon us: by 2016 sales of the ubiquitous storage medium will start to decline. So says the the Santa Clara Group's USB tracker for 2013's fourth quarter, which says last year saw humanity produce 273 million thumb drives. The average capacity of drives shipped in 2013's final quarter was 25 gigabytes, so the …
Simon Sharwood, 20 May 2014