More stories

band_aid_648

Four phone hijack bugs revealed in Internet Explorer after Microsoft misses patch deadline

Updated Microsoft has run out of time to fix four critical security vulnerabilities in the mobile edition of Internet Explorer – prompting HP's Zero Day Initiative (ZDI) to disclose their existence without revealing any damaging details. All four of the flaws present a remote code execution (i.e. malicious code injection on a Windows …
John Leyden, 23 Jul 2015
milhouse_vs_nelson_648

Object storage adoption: Why, when, where… and, importantly, but

Comment In one of my recent posts, I wrote about private object storage not being for everyone, especially if you don’t have the size to make it viable. On the other hand, we are all piling up boatloads of data and users need to access it from many different locations, applications and devices at anytime. Object storage …
Reconstruction of past climate. Credit: Insititute of Geography, Johannes Gutenberg University Mainz

SCORCHIO! This JUNE was the SIXTY-SIXTH HOTTEST on record

The press is full of reports that Planet Earth is undergoing it's hottest year EVER - that the first half of 2015 is the hottest first half yet seen, according to the NOAA among others. Is it true? In fact the contiguous US saw the tenth hottest first half of a year since 1880, when the NOAA database begins. Only such recent, …
Lewis Page, 23 Jul 2015
hacker

NSPCC: Two nonces nailed by cops every day

Two years on from the launch of David Cameron's internet crackdown in Blighty, the National Society for the Prevention of Cruelty to Children (NSPCC) reckons two offenders are convicted every day for possessing child-abuse images. "This is an alarming study and just a fragment of the hundreds of other similar convictions …
Credit: Speedy Gonsales / Edward S Curtis CC 3.0 Attribution Share-Alike Unported

Were the FIRST AMERICANS really FIRST? MYSTERY of vanished 'Population Y'

A long-vanished race of humans, whose descendants now survive only among certain indigenous peoples in Australasia and in the Amazon jungles, may have been the true, original Native Americans, according to new genetics research. The clue to the existence of this mysterious "Population Y" has been found by boffins probing the …
Lewis Page, 23 Jul 2015
Ideal for a summer blast

How to keep track of your flexible workers

It has been two years since Yahoo! chief Marissa Meyer hauled her remote working employees back into the office, intent on eliminating flexible working. The concept is becoming more popular, though, whether people like Ms Meyer like it or not. In June 2014, an amendment to the UK’s Children and Families Act came into effect. …
Robin Birtstone, 23 Jul 2015
GCHQ Benhall doughnut aerial view

Galloway and Greens challenge Brit spooks over dragnet snooping

A trio of politicians are challenging the government in a rare public hearing at the Investigatory Powers Tribunal today, alleging that British authorities ignored a ban on the tapping of MPs' and peers' telephones under a system of "blanket surveillance". The government and spooks are being dragged to the tribunal by the …
Marconi and transmission equipment

Austrian court rules online radio streaming is not broadcasting

An Austrian court has ruled that online radio streaming does not actually constitute “broadcasting”, and therefore listeners do not need to pay a licence fee. The Verwaltungsgerichtshof (Federal Administrative Court) ruled on Monday that computers with an internet connection, but without radio reception modules such as a TV …
Jennifer Baker, 23 Jul 2015
Walther PPK pistol. Pic: Art Bromage

How British spies really spy: Information that didn't come from Snowden

Feature David Anderson QC’s review of Britain’s anti-terrorism laws, published earlier this month, has mostly been examined for its potential impact on the government’s plans for a new act of Parliament on surveillance, known as the Snooper’s Charter to opponents. He made extensive recommendations as to what should be in the …
SA Mathieson, 23 Jul 2015
shutterstock_282226826-Internet-of-things

Cyber poltergeist threat discovered in Internet of Stuff hubs

New security research has revealed a whole new area of concerns for the soon-to-be-everywhere Internet of Things – smart home hubs. Hubs – devices that link into home networks to control lighting, dead-bolt locks and cameras – can be dangerously vulnerable to attack, according to security tools firm TripWire. Craig Young, a …
John Leyden, 23 Jul 2015

Ad rivals whimper: Hey Commish, we've 'ad it up to here with ad giant Google

There’s seemingly no let up in Google’s European antitrust woes, as yet another new possible battlefront opens. Advertising competitors OpenX and AppNexus have complained whinged to the European Commission that the Chocolate Factory is using unfair contracts to stop customers employing rivals services (erm, hmmm, theirs …
Jennifer Baker, 23 Jul 2015
Microsoft's new "Send" email client

Even Microsoft thinks Outlook is bloated and slow

Microsoft has admitted that its Outlook email and calendar app is too weighty and slow, releasing a new version, essentially a lighter and faster email client for the times you want to send snappy messages. Dubbed “Send”, Microsoft suggests the new app is for use when “... you just need to send a quick, short note to your co- …
Simon Sharwood, 23 Jul 2015

Flash zero-day monster Angler dominates exploit kit crime market

SophosLabs researcher Fraser Howard says the Angler exploit kit is dominating the highly competitive underground malware market: Angler's market share has exploded from a quarter to 83 per cent within nine months. The growth occurred between September and May this year, we'e told. Angler emerged in 2013 to become one of the …
Darren Pauli, 23 Jul 2015
Exit sign. Pic:  Lukas Kästner

Cisco exits set-top box biz, sheds US$1.8bn of revenue

Cisco's Connected Devices Division, a purveyor of set top boxen for service providers, is off to Europe having been acquired for €550 million / US$600 million by Technicolor. The French company, formerly Thomson (as most of its customer premises equipment/set-top boxes are branded), will take on the division first created by …

Universal Pictures finds pirated Jurassic World on own localhost, fires off a DMCA takedown

Universal Pictures France appears to have tracked down one source of pirated copies of dino-flick Jurassic World: the loopback address of one of its own boxen. In a Digital Millennium Copyright Act (DMCA) notice obtained by Chilling Effects, an entity called TMG on behalf of Universal's French limb demanded that Google remove …
Simon Sharwood, 23 Jul 2015

Cloudy VMs leak ID details that could allow attacks, says researcher

Research published by a US masters student reaches the somewhat unsettling conclusion that current cloud technologies don't separate virtual machines (VMs) as well as they could. By spying on shared resources at a low level, the research suggests, an attacker's VM can retrieve data written by another (like crypto keys), and …
Customer RCSAndroid upgrade e-mail

Hacking Team had RATted on Android: Trend Micro

The next piece of weaponised malware to emerge out of the Hacking Team leak has arrived: a Remote Access Trojan (RAT) for Android. Trend Micro researchers trawling the 400 GB of leaked files apparently have the honour of first discovery: RCSAndroid, it says, is “one of the most professionally developed and sophisticated” …

Microsoft launches Advanced Threat Analytics

Microsoft's Advanced Threat Analytics is going general-availability next month, so – as Redmond says – enterprises can more quickly spot intruders in their networks. Since the last preview version, ATA engineering head Idan Plotnik says the framework has 13 new features to make it more scalable, with improved threat detection …
Team Register, 23 Jul 2015

OpenSSH server open to almost unlimited password-guessing bug

A flaw in OpenSSH lets attackers bypass simple limits on the number of password login attempts that can be made per connection. By default, the encrypted service accepts six tries within a grace period of two minutes before breaking off a connection, which hampers brute-force attacks, but this mechanism can be easily …
Darren Pauli, 23 Jul 2015

Jeep hackers broke DMCA, says EFF, and that's stupid

It's pretty obvious really: the Electronic Frontier Foundation (EFF) has pointed out that the researchers responsible for the now-infamous “Jeep hack” broke America's Digital Millennium Copyright Act (DMCA). Similarly obvious, they say, is that such research should be legal if Detroit wants to avoid creating the cyber-Pinto. …
Sony drone

Sony eyes enterprise drone biz as next big little thing

Sony has found a bottle of Jeff Bezos' Kool-Aid lying around, drunk it, and signed a deal with Japanese UAV outfit ZMP. To be fair, the new venture isn't predicated on delivering books by drone. Rather, Sony wants to get some of its key technologies airborne. Under the joint venture, Sony will contribute “camera, sensing, …
A Chinese laundry on the back streets of Shanghai

Chinese IT spending with western firms goes OVER A CLIFF

US tech companies report big trouble in China, despite official data claiming strong growth in the middle kingdom. The official data has growth ticking along at 7 per cent per annum. While that's at the low end of what Beijing wants, it was still welcomed by articles like this one, in state-owned organ Xinhua, explaining “The …
Simon Sharwood, 23 Jul 2015

Microsoft joins attack on 'non-consensual pornography'

Microsoft has joined the online drive against so-called "revenge porn" in which people's naked or otherwise embarrassing/erotic pictures are posted widely online. In June, The Chocolate Factory announced an initiative to let individuals report images and videos for removal. Microsoft's now done likewise, with chief online …
Ashlee Vance, Elon Musk: How the Billionaire CEO of SpaceX and Tesla is shaping our Future

Intelsat to FCC: For the love of satellites, STOP ELON MUSK!

Elon Musk wants to use his commercial SpaceX rockets to put satellites into orbit that will bring broadband to the next billion, but one of SpaceX's own customers has thrown a wrench into the works. Musk's plan involves encircling the globe with a few thousand high-capacity, low-latency satellites that the Tesla Motors boss …
Neil McAllister, 23 Jul 2015
Bob and Doug McKenzie of Canada

Canucks: Hey, Big Dog Telcos. Share that fiber with the little guys, eh?

The government of Canada has ruled that large broadband providers will have to open up their fiber data lines for use by smaller carriers. The Canadian Radio-television and Telecommunications Commission (CRTC) said Wednesday that large incumbent companies who control high-speed data lines will now be required by law to make …
Shaun Nichols, 23 Jul 2015
warrant

Facebook fails to block NY DA's fat warrants for profiles of suspected September 11 fraudsters

A decision by a New York judge means that people's Facebook profiles are an open book to prosecutors armed with a warrant, despite the firm's best efforts. Back in July 2013, the New York District Attorney obtained court warrants to access the full profiles and message databases of 381 NY Facebook users suspected of defrauding …
Iain Thomson, 23 Jul 2015

You can secretly snoop on someone if they butt-dial you – US judges

A US court of appeals has ruled that phone calls started by accident in your pocket – so-called butt dialing – can be lawfully recorded. The Ohio Sixth Circuit appeals court found in favor [PDF] of a woman who recorded the conversations of a colleague who had unknowingly dialed her number before entering a meeting. James …
Shaun Nichols, 22 Jul 2015

Dear diary. Gotta axe 15% of staff, it's like I'm cracking up – Qualcomm

Mobile chipmaker Qualcomm says it's putting its business under the microscope with an eye to restructuring after posting lackluster third-quarter results, including revenue that missed estimates. "We are making fundamental changes to position Qualcomm for improved execution, financial and operating performance," Qualcomm CEO …
Neil McAllister, 22 Jul 2015
UNicorn

Storage unicorns and their hyped-up horns

Comment A venture-capitalist-tracking website has revealed a list of unicorns, which are startups valued at a billion dollars or more. Eight storage companies are in the list; does this mean a glorious outcome for them? The CB Insights’ list contained these familiar names: Dropbox at $10bn (£6.4bn), and hence a “decacorn” Cloudera …
Chris Mellor, 22 Jul 2015

Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet

Code dive You can bypass Apple's space-age security and gain administrator-level privileges on an OS X Yosemite Mac using code that fits in a tweet. Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged- …
Chris Williams, 22 Jul 2015

Security tool bod's hell: People think I wrote code for Hacking Team!

A respected security researcher has denied any involvement with Hacking Team after open-source code he wrote was found in smartphone spyware sold by the surveillance-ware maker. Collin Mulliner works in SecLab at Northeastern University in Massachusetts, US, and is a regular at hacking conferences. He told The Register he's …
Iain Thomson, 22 Jul 2015
apple music

'Apple lures labels from free streams – and why is no one doing anything about it' shrieks group

A pressure group in America has urged US watchdog the FTC and Uncle Sam's Department of Justice to probe Apple Music for signs of antitrust violations. Consumer Watchdog has written a letter [PDF] to the five commissioners of the FTC as well as DoJ attorney general Loretta Lynch and assistant attorney general William Baer …
Shaun Nichols, 22 Jul 2015
lottery

Lottery IT security boss guilty of hacking lotto computer to win $14.3m

Iowa state lottery's IT security boss hacked his employer's computer system, and rigged the lottery so he could buy a winning ticket in a subsequent draw. On Tuesday, at the Polk County Courthouse in Des Moines, Iowa, the disgraced director of information security was found guilty of fraud. Eddie Tipton, 52, installed a …
Iain Thomson, 22 Jul 2015

Hark, the Hacking Team angels sing, it’s not us who’ve actually sinned

The Hacking Team pushed out a new statement on Wednesday, moaning that the only victim of the mega-breach against its systems is Hacking Team itself. Eric Rabe, the firm's chief marketing and communications officer, complained that the controversial outfit is “being treated as the offender, and the criminals who attacked the …
John Leyden, 22 Jul 2015
Containers_at_port

Open Container Project renames, says standard is just weeks away

One month after launching an industry-wide consortium aimed at creating a common runtime and image format for application containers, Docker and the Linux Foundation say the effort is making rapid progress. One big(ish) change is in the name. The group launched in June as the Open Container Project. Henceforth it will be known …
Neil McAllister, 22 Jul 2015
Pebble Time

Neat but narky at times: Pebble Time colour e-paper watch

Review I love what Eric Migovsky has done with the Pebble by creating an antidote to modern smartwatches. The two generations of Pebble so far have been useful, durable and practical – qualities which elude the over-specced and costly Apple and Android kit. Pebble Time Pebble Time: Fit for purpose With its early mover advantage, …
Andrew Orlowski, 22 Jul 2015
Golden_Gate

ATTOboy, says Nexenta as it lets you HA-ve a FibreBridge or two

NexentaStor MetroHA provides high-availability at city-wide distances for NexentaStor shared storage arrays, making it viable for high-availability needs. NexentaStor's open source storage software involves controllers (heads) linking to the storage enclosures by ATTO FibreBridge 6500 rackmount controllers by 8Gbit/s Fibre …
Chris Mellor, 22 Jul 2015

Storage slump? Dunno what you're talking about, beams EMC

EMC basically saw off most signs of a storage slump with a two per cent revenue rise in its second quarter 2015, although with revenue being reduced after paying $75m in a VMware pricing settlement with the US government. Revenues of $5.98bn generated profits of $487m, 17 per cent down on profits a year ago, but still well …
Chris Mellor, 22 Jul 2015

AI finally understands primitive sketches – aka marketing presentations

Artificial intelligence scientists have developed a neural-network that understands incomprehensible scrawled drawings of the sort created by children, marketing departments, architects, design creatives, and so on. The academic developers of the "Sketch-a-Net" software proudly boast that their brainchild is actually better at …
Lewis Page, 22 Jul 2015

Report links alleged US, Israeli cybercrims with JPMorgan MEGAHACK

Federal authorities in America have charged five men who are being indirectly connected with the attack and data breach at JPMorgan Chase last summer, after the global bank, with total assets of $2.6tn, lost the contact data for millions of customers. The attack now appears to have been sourcing targets for a fraudulent …
Fibre Optic by Barta IV https://www.flickr.com/photos/98640399@N08/ cc 2.0 attribution https://creativecommons.org/licenses/by/2.0/

Pakistan wants to copy GCHQ and eavesdrop on world+dog's comms

Pakistan's intelligence agencies want to snoop on all communications crossing its borders. Documents published by Privacy International (PI) on Wednesday (PDF) show Pakistan’s Inter-Services Intelligence (ISI) agency proposed a programme to monitor all international IP traffic coming into and out of the country, encompassing …
Jennifer Baker, 22 Jul 2015
Funnel of cash. Credit: via SXC – http://www.sxc.hu/profile/Leonardini

Cut-throat cloud pricing not as cut-throat as you'd think

Cloud providers have taken a leaf out of the budget airlines playbook, with what looks like a suicidal price war masking static pricing on the added value services that customers actually need to run real businesses. But while overall cloud costs are not plunging anywhere near as precipitously as headlines might have you …
Joe Fay, 22 Jul 2015