986 posts • joined 21 Sep 2011
Billion is always 1,000 million.
"What exactly does a desktop/laptop OS made by Microsoft have to do with a new iPhone?"
Headlines and deadlines. It'll be interesting to see the two go head to head for coverage, if they happen at the same time.
Re: Sorry that handle is already taken
"This needs to be qualified by a statement that they've taken over a particular system"
Which is explained in the article.
"Can be used on any traffic signal site, anywhere in the world"
Read the article. What you've claimed is not reflected, overall, in what's published here.
Re: Does Yahoo really go around taking screenshots of peoples desktops?
I think the keyword here is "similar" – it's in the interests of web giants to avoid indexing or accepting email, etc, from obviously insecure hosts.
Re: What OS & server platform was infected?
"Any idea what the OS and server platform that was infected with the Malware was?"
No. I did ask the UPS PR team on the phone as desk editor. They wouldn't tell me the malware type. When I asked: "This is Windows malware, right?" There was a pause and the reply: "I couldn't possibly comment."
As soon as I find out, I will push out an update. UPS right now is in alert-affected-customers mode. Once they've got through the financially tricky stage of supporting pwned citizens, they'll release the techy details – or so they tell me.
"I actually *was* just catching up with some old friends."
I wouldn't worry, that's kinda how SiT is supposed to go :-)
Re: What happened to the Citrix story ?
Sometimes we agree to publish stuff on a particular day if it means we can ask questions and get answers ahead of an official announcement being made. It means our take on some development appears at the same time as the vendor's, rather than hours later. There are pros and cons to this approach.
In this case, a story ran a day early. Check again tomorrow, I'm afraid.
Re: Total Inability To Support Usual Performance (TITSUP)
"May I have permission to officially use this acronym when describing issues to our company's customers?"
Go for it: IT giants ask why we use the word 'titsup' in headlines to describe services suffering outages, some even going as far as to suggest we should stop using the word. Today we spell it out.
Re: Two different organisations?
Sure, that's why the article says "It's not the first time the Supervalu brand has been targeted."
Re: Come on El Reg.....
"Not even SSL on account creation????"
Yes, we know. Hopefully this will change.
Yes, The Reg doesn't serve over HTTPS. Hopefully, we can change that soon.
Re: Missing information
"What systems can it infect?"
You name it, your government can own it.
"It is impossible to have hardware segregation to prevent malware attacks because the hardware cannot know the legitimate purpose and scope of an application"
You're absolutely right, IMHO.
Re: Re: Boring Green Re: Anon Cluetard
"Time for more multiple posts to try and work out what has upset the PCness of El (or should that be Al-) Mod."
Stone me, stop your crying.
Re: Why compare it to a Xeon?
"A fair comparison would have been to the Atom C2758"
Ah, good spot - fair enough. I'll add it in.
Re: Why not
"just use your facebook login?
Don't joke, the UK government floated the idea of using Facebook accounts as official ID for accessing public services.
Re: Hold Security
I kinda feel sorry for Alex Holden because he's proven in the past to be an investigative infosec bod - such as helping to uncover the massive Adobe hack with Brian Krebs.
Announcing a Russian gang had, one way or another, obtained a lot of passwords and then asking ppl to join an ID-theft alert service is going to rub people the wrong way.
Re: WTF ????
Calm down, love. You're causing a scene.
From Microsoft's IE Blog (it's linked in the article):
"As part of our ongoing commitment to delivering a more secure browser, starting August 12th Internet Explorer will block out-of-date ActiveX controls."
The keyword here is "out-of-date". Yes, IE blocks dodgy ActiveX controls but what's significant here is that MS has decided to rule out all but the very latest Java plugins. So if you'd OK'd an earlier version, tough: it's now out of date.
Re: Re: so we have a new bug
Nah, that was to avoid a flamewar in which we get loads of people reporting each others comments. In the end, I donned the fire-proof suit and switched the comments on.
Re: Too good to be true?
It's only right to have a healthy level of skepticism. If we can stand it up any further, you'll be the first to know.
Re: A tabloid journalist for El Reg with Fluency in English eh
"in case you weren't so aware, a tabloid press / outfit, is generally associated with sensational news"
We're very aware of it :-) I love being accurate and in-your-face; it drives boring people mad.
"I wonder why El Reg would require fluency in English"
Editing is a PITA if the writer isn't fluent in the language. Plus, you need to be fluent to be funny, interesting and informative in your writing.
"I learned from what I consider the best."
Re: Re: I call semi-bollocks
"This isn't a tool for the S'kiddies, this is potentially grown-up stuff."
Absolutely. This isn't for Anonymous. This is for cops and g-men. Strike up a conversation with someone at a conference, you've had a few beers, he or she suggests you whack in a USB stick to copy over some stuff you'd be interested in. You're savvy, you know you've disabled autorun and open documents in a VM or a non-sensitive machine. You're confident.
Doesn't matter in this case. Game over.
Re: This is nothing new... this has been done for years!
"This type of hack has been done for year."
Again, like the modified mouse above, this is custom hardware. You have one evil USB plug, there. Just one. What are you going to do? Go around plugging it into everyone you want to pwn?
With this BH exploit automated, you can modify USB sticks using purely software again and again and again, whenever a device with a supported micro-controller is plugged in to an infected PC. That's the point of this BadUSB.
"We need better reporting."
I need a better reader.
Re: Errmm.. old news?
"There was stuff about this *years* ago. I saw a demo of an 'infected' USB mouse infecting a PC it was plugged into"
You're talking about this? Look at it. It's been *physically* modified. This BH talk is about rewriting the firmware in an undetectable manner.
Imagine automating the process of rewriting the firmware using just software: every time a supported stick is plugged in, and your malware is on the PC, you get to infect the stick's firmware silently and reliably.
Which means, in theory, you can spread your software nasty from thumb drive to thumb drive (if they're using supported micro-controllers), creating an infection.
Having said that, this process is not /that/ new - see the links in the story to older presentations. What I believe is new here is reliable and realistic firmware rewriting that can be demonstrated on stage and weaponized.
Re: Michael C
"I may be missing something but how does the malware get on the USB device in the first place?"
I imagine you reverse engineer a vendor tool that updates the firmware, so you can see the magic packets needed to put the device into program mode. You then either read the firmware off the chip (if poss) or download a firmware update and work out what the raw binary is.
From there, you work out how the chip works internally: where registers are and so forth. You add in your new code, hook it up so it runs, and then upload that modified firmware to the controller in program mode.
Now you're all set. After that, make sure the PC malware you install has the capability of automating the above. And now you're cooking on gas.
IMHO it's the reverse engineering of the firmware and the firmware programming that's impressive. You shouldn't trust USB sticks anyway on machines that are sensitive. If you genuinely care about information security, you'd compartmentalize your data and systems so that plugging a random USB thing into your gaming PC doesn't screw over your machine with your PGP keys.
Re: Strange invite received from @sitpub.com citing one comment of mine
Thanks. Can you tell me, please, who that was so I can follow it up? Email cwilliams @ theregister dot co dot uk, thanks.
FWIW Sitpub stands for Situation Publishing, the biz wot does The Register.
"We're using it in HACMS"
OK - I've tweaked the article.
Re: ... 50year warranty period ...
No, it's a typo.
"At least you have a couple decent ones pretty close to your office"
Being based in San Francisco, we were at a rowdy place in the Mission, 16th and Valencia actually. The thing about having smartwatches and smartphones is that work emails (particularly corrections@ which we take seriously) tend to catch our eye even after a few jars of Anchor Steam.
Anyway, in the sober light of day I've taken the manual mod off Brian Scott poster's account. But please do keep pinging the corrections address - we'll pick 'em up night and day :)
"Actually, that's OpenBSD not NetBSD"
So why didn't you email firstname.lastname@example.org? So you'll find all your comments moderated from now on. Well done.
It was fixed as soon as we spotted the mistake - in fact, it was corrected while we were in the bar after work.
Re: bunch of tw@ts
"Would this kind of thing earn me a letter"
No, I don't think that sort of file is on the BPI et al radar.
Re: Re: #Dell / Equallogic
"Chris just didn't reach out to us for this story."
Full disclosure: LJL is a Dell employee.
Re: I Ask
We don't know yet beyond Machine will use a mix of standard processors (x86 or ARM, say), and then custom silicon to finish the job.
When we find out, we'll let you know.
Re: No, they're not sekret spying tools
"pcapd - so top sekret it's been a documented developer tool for years"
No - the developer doc you linked to is about analyzing traffic from another device on the network, not by the device itself which is what pcapd does, allegedly. The doc you linked to says "iOS does not support packet tracing directly". That's contradicted by Jonathan's claims.
The other things you link to are not documented by Apple officially (AFAIA). They may well have been known for a while. There's no harm in a serious security researcher joining up all the dots for everyone.
Unless you're just happy doodle dandy with everything as it stands.
Re: Great article.
Perl is perfection. No need to improve it.
The HTTP remote management is on by default. And there is no workaround.
Re: Come on!
The key thing is DHCPv6 from what I can tell. I've tweaked the article.
Don't forget to email email@example.com - your comments won't be seen and articles won't be fixed unless someone drops us a note. And we all want articles accurate, right?
Re: Daniel Palmer
Yeah it was a typo - should be 3.10. Don't forget to email corrections@theregister next time.
Re: Or just plain offensive?
I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question.
Re: What A Load Of Shit
I was going to take your comment seriously, then I saw your username.
Re: NetApp is also a preferred design reference partner
Full-disclosure: gps1539 works for NetApp.
Re: Digital Sex
"When I saw this story on the Daily Fail"
FWIW on the time delay: we saw this story first emerge on Friday evening (California time), but held off until we were able to obtain the court filing this morning. Just to check, y'know.
Re: I can't believe
"I wasted a few minutes reading Nadella's memo"
We did warn you!
Re: Most obnoxious article title in history
- Review Is it an iPad? Is it a MacBook Air? No, it's a Surface Pro 3
- Hello, police, El Reg here. Are we a bunch of terrorists now?
- Video of US journalist 'beheading' pulled from social media
- Netflix swallows yet another bitter pill, inks peering deal with TWC
- The Register to boldly go where no Vulture has gone before: The WEEKEND