Articles about Variants

Wall of Spam. Pic: freezelight

Spamquake subsides: less than half of email is now processed pork

Spam levels have fallen to below 50 per cent of all email sent for the first time in a decade, according to security firm Symantec. The milestone comes from a 1.8 per cent decline in spam rates from last month, when spam accounted for 51.5 per cent of sent email. Threat bod Ben Nahorney said it was the lowest rate since …
Darren Pauli, 20 Jul 2015

Hacker launches ransomware rescue kit

Security bod Jada Cyrus has compiled a ransomware rescue kit to help victims decrypt locked files and avoid paying off crooks. The kit sports removal tools for common ransomware variants along with guides for how to perform the necessary tasks. Cyrus recommends users not pay ransoms as doing so sustains the criminal business …
Darren Pauli, 21 May 2015
The Pacific sleeper shark spotted by Nat Geo survey

Forget lasers: how about sharks with frikkin' VOLCANOES?

Vid A bunch of volcanologists working near the Solomon Islands has turned up a find that left them “freaking out”: a seldom-seen variety of Pacific sleeper shark just about living in a volcano. The group, working with National Geographic, were studying underwater volcanoes earlier this year when they caught the high-definition …

BOT-GEDDON coming after ZeusVM leak, hacker warns

Former Kaspersky Japan boss now malware researcher Hendrik Adrian is warning of a boom of ZeusVM botnets, after the trojan source code was leaked online. Version two of the builder and panel source code leaked last month, and spotted by the French malware researcher known as Xylitol Adrian, who uses the online handle …
Darren Pauli, 07 Jul 2015
CN72/73xx Block Diagram

Cavium adds 4/16 core SoCs

Cavium is filling out a scale gap in its Octeon III system-on-a-chip (SoC) range with he four-to-sixteen core CN72xx and CN73xx variants that are pin-compatible with the rest of the range. The MIPS64-based SoCs are low-power network processors pitched between the one-to-four core CN71xx and the 24-48 CN78xx range. The chips can …
CloudSpeed_Eco_Gen_2

SanDisk speeds up CloudSpeed Eco, raises capacity

SanDisk has souped up its CloudSpeed Eco SSD for cloud service providers, doubling its capacity and raising throughput, courtesy of a process shrink. CloudSpeed Eco Gen 1 was introduced at the end of March last year as a cost-effective SSD for cloud service provider use. It was built using a 19nm chip process and held up to …
Chris Mellor, 01 Jun 2015
hdd_head_stack_648

WD unleashes bigger, badder, Black and revved, rapido Red Pro

WD has upped its 3.5-inch Black and Red Pro drives to the 6TB capacity level, adding 5TB and 6TB variants to the existing product ranges, which previously topped out at 4TB. The Black drive is a 3.5-inch drive for desktop, workstation and gaming use. The 5 and 6TB capacity products get doubled cache at 128MB and can be up to …
Chris Mellor, 19 Aug 2015

Blackhats using mystery Magento card stealers

Sucuri infosec researcher Peter Gramantik says carders are exploiting an unknown vulnerability to steal billing information from e-commerce sites that use eBay's Magento platform. Gramantik found an attack script that plunders POST data and identifies valuable payment data before storing it as an encrypted image file. He says …
Darren Pauli, 29 Jun 2015
Dell SCv2000 storage array

Compellent kicks EqualLogic out of Dell's bottom end: New SCv2000

When Dell acquired EqualLogic and later Compellent, it used the former brand for its low-end storage and the latter for its bigger bit boxen. The company's now booted EqualLogic out of the bottom end with the new entry-level SCv2000, a US$14,000 array that does everything a larger Compellent does, but for less. Dell hasn't yet …
Simon Sharwood, 06 May 2015

Net scum respect their elders so long as it leads to p0wnage

Net scum are employing both cool new attacks like the Angler exploit kit and oldies-but-goodies such as macroviruses in their undergoing something of a generational clash, with Cisco reporting both Word macros and the sophisticated Angler exploit kit are the most popular attack vectors this year. Blackhats dumped macros as an …
Darren Pauli, 20 Aug 2015

Facebook unleashes mighty data trove to learn how you laugh

Facebook data scientists Udi Weinsberg, Lada Adamic, and Mike Develin say most social media addicts will write 'haha' once a week, that New Yorkers are emoji addicts, and none uses 'lol' anymore. The awesome demonstration of big data rigs at The Social NetworkTM uses a regular expressions set to crawl over an unspecified …
Darren Pauli, 10 Aug 2015
Bookshelf in the British Library basement

Borg blacklist assimilates Cryptolocker domain name generators

Cisco has developed a means to accurately identify the fleeting pop-up domains used by some of the world's worst malware. The platform builds a reputation score that is in part based on word sources including more than 60 dictionaries, Census data and Alexa top 1000 domains. Using multiple sources helps to identify the …
Darren Pauli, 10 Aug 2015
Ransom note saying "Pay Up" in blackmail type

Android ransomware poses as FBI smut warning

Cybercrooks have launched a new wave of Android ransomware that poses as a pretty convincing FBI-imposed porn-surfing warning. Over 15,000 spam emails, including zipped files, have hit the inboxes of Android users in recent days, according to Romanian security software firm Bitdefender. If activated, the ransomware demands $500 …
John Leyden, 26 May 2015
Fujitsu TR800

Diamonds are forever, Fujitsu Eternus now for VDI

Fujitsu has added a bunch of new variants to its Eternus TR storage arrays, targeting large scale desktop virtualisation environments. The models are the Eternus TR820, TR850 and TR880, with the last in the list claiming the ability to connect 3,500 VMs, which the company says is nearly double the scale of its previous models. …
Team Register, 20 Jan 2015

AI finally understands primitive sketches – aka marketing presentations

Artificial intelligence scientists have developed a neural-network that understands incomprehensible scrawled drawings of the sort created by children, marketing departments, architects, design creatives, and so on. The academic developers of the "Sketch-a-Net" software proudly boast that their brainchild is actually better at …
Lewis Page, 22 Jul 2015
iglu_blaze

X-IO erects its iglu over the data management market

X-IO, the supplier of just-won't-fail ISE storage boxes, has added a data management services head unit which can support up to 11 ISE blocks, calling it an iglu. ISE, the Integrated Storage Elements, come in disk (100 and 200), all-flash (800) and hybrid flash/disk (700) variants, have a five-year sealed box warranty and …
Chris Mellor, 28 Jul 2015
Headshot of Trojan horse

Fareit trojan pwns punters with devious DNS devilry

DNS tricks used by the Fareit trojan mean users are tricked into downloading malware, seemingly from Google or Facebook The latest variants of Fareit are infecting systems via malicious DNS servers, Finnish security firm F-Secure warns. These servers push bogus Flash updates that actually come packed with malicious code, as a …
John Leyden, 06 Mar 2015
No Sale

PC sales dip below 2009 levels, with Japanese sales off 44 per cent

68.5 million PCs trundled off the world's production lines in 2015's first quarter, the lowest number since 2009 according to box-watcher IDC. The news isn't all bad: the analyst firm had previously predicted a lower number. But it's still a 6.7 per cent dip on last year's first quarter. Newer PC designs are exciting punters, …
Simon Sharwood, 10 Apr 2015
Zuck balloons

Facebook policy wonk growls at Europe's mass of data laws

Facebook's Brussels lobbyist Richard Allan took to the pages of the Pink 'Un on Wednesday morning to have a good old moan about "multiple" EU nations digging around the free content ad network's data-slurping biz practices. He complained that the actions of national privacy watchdogs within the 28-member-state bloc posed a …
Kelly Fiveash, 29 Apr 2015
Fake Apple Watch

Can't pay $349 for an Apple Watch? Get a Chinese knockoff for less than $50

China's legendary counterfeit craftsmen have been quick on the draw and are selling rip-off Apple Watch lookalikes for a fraction of the price, even though Cook & Co haven't shipped any devices as yet. "These guys are specialists," Laurent Le Pen, founder of Shenzhen smartwatch maker Omate, told CNN. "The speed at which they can …
Iain Thomson, 10 Mar 2015

Poison résumé attack gives ransomware a gig on the desktop

Security researchers are focussing their crosshairs on what appears to be high-volume spam and exploit campaigns to deliver the latest iteration of the Cryptowall ransomware. Boffins from the SANS Institute, Cisco, and MalwareBytes have identified a dangerous if goofy spam campaign slinging the nasty ransomware masquerading as …
Darren Pauli, 12 Jun 2015
Liam Neeson, Taken

Wait, STOP: Are you installing Windows 10 or RANSOMWARE?

People aren't good at waiting for stuff, and with computer users queueing up to download Windows 10, ransomware purveyors have started to move in. CTB-Locker This is going to be expensive ... Cisco's security team has noticed a new spamming campaign attempting to spread the CTB-Locker ransomware using emails purporting to …
Iain Thomson, 31 Jul 2015

We’re in bed together, admit Intel Security, Trend Micro and NCA

The UK's National Crime Agency has enlisted two leading security firms as part of a collaborative intelligence-sharing effort. Intel Security and Trend Micro will be part of the "virtual threat teams" which will provide the police with intelligence on cybercrime threats in the UK and the rest of the world. As both companies …
dragster_648

DDN: Quicker storage access passes HPC buck to CPU makers

Comment At a DDN user group meeting in Frankfurt earlier this year, Alex Bouzari said high-performance computing (HPC) exhibits an enduring tug-of-war between compute and storage. The co-founder and CEO of DataDirect Networks – which makes fast-access and capacious storage for supercomputing and HPC – speaks from the storage side of …
Chris Mellor, 27 Aug 2015

AT LAST: Australia gets its very own malware

Australians are being targeted by a new variant of the Carberp malware under what appears to be renewed criminal interest in the antipodes. The modified trojan, Carberp.C, was spread through a spam operation masquerading as a payment invoice. Virus writers pushed the malware out a day after coding it, Symantec researcher …
Darren Pauli, 19 Jan 2015
Intel sign by StockMonkeys.com

Intel's new chips are from 'Purley' – know what I mean? Know what I mean? Say no more

A presentation given at a conference on high-performance computing (HPC) in Poland earlier this month appears to have yielded new insight into Intel's Xeon server chip roadmap. A set of slides spotted by our sister site The Platform indicates that Chipzilla is moving toward a new server platform called "Purley" that will debut …
Neil McAllister, 27 May 2015

Cisco battles POODLE with a listicle and some twaddle

Cisco has joined the growing list of vendors scrambling a response to the POODLE vulnerability, with a number of systems confirmed vulnerable and more under investigation. The Borg's current POODLE status only clears one system: the Cisco Adaptive Security Device Manager. The company says its ongoing assessment of products for …
Headshot of Trojan horse

Vawtrak challenges almighty ZeuS as king of the botnets

Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned. Vawtrak currently ranks as the single most dangerous threat, according to PhishLabs. Only Zeus and its many variants (GameOver, KINS, ZeusVM, Zberp, etc.) taken as a single malware "family" would outrank …
John Leyden, 27 Dec 2014
management regulation1

Cisco slings small change at CSIRO over WiFi dispute

Australia's Commonwealth Scientific and Industrial Research Organisation (CSIRO) has wrapped up a loose end in its long-running patent arguments over WiFi, winning an American judgement against Cisco over royalty payments for CSIRO's technology. The long-standing argument wasn't over patent infringement – both parties agreed …
Random numbers

'Bar Mitzvah attack' should see off ancient and crocked RC4 algo

Security boffin Itsik Mantin has found a new attack based on old weaknesses that is the first 'practical' attack on SSL that does not require man-in-the-middle to steal sensitive data from RC4 algorithms. The Imperva bod's research reveals a 13 year-old weakness in the superseded algorithm, which is known to be insecure but is …
Darren Pauli, 27 Mar 2015
Malware

Apple tries to kill iWorm: Zombie botnet feasting on Mac brains

Apple has updated its XProtect anti-malware system to squash several variants of the iWorm before the malware causes any further damage. The changes to the program XProtect.plist allows OSX to detect and block three species of iWorm, helpfully named OSX.iWorm.A, OSX.iWorm.B, and OSX.iWorm.C. XProtect is Apple's rudimentary …
Jasper Hamill, 06 Oct 2014
cloud

Extreme adds switches and partners

Extreme Networks has launched a quartet of switches and a management appliance, in what it says is an expansion of its software defined network (SDN) strategy. Back in June, the company launched its OpenStack SDN platform. That launch wrapped a bunch of API toolkits together with NetSight management and Purview optimisation …
Haswell-E Motherboards

Intel's Haswell-E brain to emerge from the lab at end of August – reports

Intel has reportedly fixed a date to ship its octo-core Haswell-E processors and X99 Express chipset, with a Japanese outlet saying they will hit the shelves on August 29. Japan's Hermitage Akihabara says the high-end desktop silicon and associated motherboards have been brought forward a little from the expected September ship …
Osborne 1, second version - DRAM detail

Is that a graphics driver on your shop's register – or a RAM-slurping bank card thief?

Crooks are infecting sales registers running Oracle-owned MICROS software with malware tailor-fitted to steal bank card information from the machines. MalumPoS scrapes sensitive data from the RAM inside the tills, which are used in places from shops and restaurants to hotels and bars. The software nasty can be easily modified to …
John Leyden, 09 Jun 2015
StoreServ_20000_rack_detail

HP's 3PAR trifecta soups up entry-level, AFAs and software

HP has replaced its 7000 series 3PAR StoreServ array with a gen-5 ASIC-based StoreServ 8000, starting at $19,000. It's also added a top-end 20800 starter config, a lower-cost 20000 all-flash product, and enhanced its StoreServ OS. The new all-flash array (AFA) products will increase the competitive heat on IBM, EMC, Pure …
Chris Mellor, 27 Aug 2015
More flaws found in Java

Azul tackles Oracle with open-source Java for Internet of Stuff

Azul Systems has added a new, ultra-compact entry to its portfolio of alternative Java environments, taking a run at Oracle for the lucrative mobile, embedded, and Internet of Things (IoT) markets. Zulu Embedded is a stripped-down sibling of Zulu, Azul's certified, cross-platform build of OpenJDK – Oracle's open source reference …
Neil McAllister, 25 Mar 2015

Bad romance: Ransomware, exploit kits in criminal cuddle

The lowlifes behind the Cryptowall ransomware seem to have decided it's no longer worth developing their own exploit kits. Instead, according to analysis by Cisco, they're relying on other popular exploits to distribute the malware. The ransomware was considered one of the most effective ransomware offerings that encrypted a …
Darren Pauli, 10 Feb 2015
Facebook's 6-pack

Hey, network giants: Facebook swigs from an 'open' 6-PACK of tech

Facebook has taken another step towards kicking the traditional switch vendors out of its network, setting their chassis-based switches in the cross-hairs. The Social NetworkTM has created a chassis and fabric for the Wedge switches it let loose on its data centres last year. Announced at today's Facebook Networking@Scale event …
Lego Godzilla

Intel raises memory deflector shields in Xeon E7 processor refresh

Intel has given its Xeon E7 processor family its annual refresh, this time emphasising analytics at scale. The new E7-8800/4800 v3 chips use the Haswell micro-architecture, meaning all Chipzilla's Xeons have made the jump. Intel's been a bit cagey, and did not share the list of E7 v3 models as we were going to press, but we're …
Simon Sharwood, 05 May 2015
Cryptowall ransomware notice

KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION

Victims of the CryptoWall ransomware have been extorted out of at least $1m. Despite a takedown operation in June, CryptoWall continues to be the largest and most destructive ransomware threat on the internet, according to the latest analysis of the threat by security researchers from Dell SecureWorks Counter Threat Unit. …
John Leyden, 29 Aug 2014
HP

HP flicks white box switch: NOT a Facebook wannabe? Stuff our open kit in your cloud

Less than a week after Cisco's John Chambers dismissed the “white box” switch category, HP has entered that market with its own open architecture switches. The company wants to start with “web scale” cloud operators who don't want to imitate Facebook or Google and run up their own systems from scratch. However, according to CTO …

Please use TWO HANDS to access AdultFriendFinder

Four hosts are behind one in two typosquatting attacks against the top 500 websites, research has found. The hosts and their fellow fraudsters had registered domain names mimicking three-quarters of the internet's 500 most popular websites, say University of Leuven researchers Pieter Agten, Wouter Joosen, and Frank Piessens, who …
Darren Pauli, 16 Jan 2015
Headshot of Trojan horse

Banking trojan scourge gallops on, despite more fences

RSA 2015 Banking botnets persist as a threat despite recent high-profile takedowns which only achieve a temporary calming effect, according to a new study from Dell SecureWorks. Between mid-2014 and early 2015, coordinated efforts involving law enforcement and private-sector industry disrupted three of the most active banking botnets ( …
John Leyden, 23 Apr 2015
Apple iPod Classic

Apple's ONE LESS THING: the iPod Classic disappears

Amid all the colour and movement generated by Tuesday's launch of new iPhones and the Apple Watch, Cupertino looks to have quietly killed the iPod Classic. A visit to www.apple.com/ipod/ or its national variants reveals a range of iPods that includes the iPod Shuffle, Nano and Touch, plus the Apple TV. But there's no mention of …
Simon Sharwood, 10 Sep 2014

CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes

Miscreants have brewed up a variant of the infamous CryptoLocker ransomware that uses worm-like features to spread across removable drives. The recently discovered CRILOCK-A variant can spread more easily than previous forms of CryptoLocker. The latest nasty is also notable because it comes under previously unseen guises - such …
John Leyden, 02 Jan 2014
Sean Connery in Dr. No

Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER

Amnesty and Privacy International are offering a free-of-charge spyware detection tool designed to help journalists and human rights activists stay one step ahead of government surveillance. The Windows-only Detekt anti-spyware tool is designed to be a supplement, rather than an alternative, to pre-existing anti-virus protection …
John Leyden, 20 Nov 2014
Ultrastar_SSD1600MH

HGST polishes Ultrastar SSD whoppers, stuffs with denser Intel flash

HGST has refreshed its Ultrastar enterprise SSD line, using denser 20nm NAND to replace the previous 25nm flash, doubling capacity, upping read performance but lowering write performance a tad in the process. The starting point was a three-product Ultrastar SSD800 line-up, maxing out at 800GB and coming in MH (write-intensive), …
Chris Mellor, 28 Jul 2014
Intel Xeon

Intel's SECRET Xeons: tell us what you think Chipzilla's hiding

POLL At the Australian launch of Intel's new Xeon E5-2600 v3 yesterday, Chipzilla's local folks popped up a slide trumpeting the fact that the chip now comes in 35 special flavours. Your correspondent asked Intel to name a few, which prompted a response that pre-launch debate considered whether or not to include the slide because …
Simon Sharwood, 10 Sep 2014
Ciscoblood

Cisco denies plans to pull its cash out of VCE

Cisco has denied it will stop investing in VCE – the converged systems company financed by itself, EMC, and EMC sub VMware – following a report that appeared across the pond, citing unnamed sources. “Cisco is not pulling out of VCE,” the company’s senior PR manager, Gareth Pettigrew, said. “VCE customers and partners can be …
Chris Mellor, 09 Oct 2014
Flytrap

Use home networking kit? DDoS bot is BACK... and it has EVOLVED

A router-to-router bot first detected two years ago has evolved - and now has the capability to reconfigure the firewalls of its victims. The Lightaidra malware captured by security researcher TimelessP (@TimelessP) is an IRC-based mass router scanner/exploiter that's rare because it spreads through consumer network devices …
John Leyden, 09 Sep 2014