|
by Richard Chirgwin on (#1ZZVB)
Virtualisation isn't protection: an attacker can escape containers Here's another reason to pay attention to patching your Linux systems against the Dirty COW vulnerability: it can be used to escape Docker containers.…
|
The Register
| Link | https://www.theregister.com/ |
| Feed | http://www.theregister.co.uk/headlines.atom |
| Copyright | Copyright © 2026, Situation Publishing |
| Updated | 2026-04-08 14:45 |
|
by Simon Sharwood on (#1ZZQS)
'Customers shouldn’t have to be the ones discovering these bugs!' says vExpert VMware says its NSX network virtualisation product is growing fast … perhaps too fast, because it's again been found to have a nasty bug.…
|
|
by Richard Chirgwin on (#1ZZMS)
It's nearly 2017, and Word macros are STILL spreading malware The miscreants behind the Nymaim malware dropper have updated their code to include better obfuscation and blacklisting against security software.…
|
|
by Richard Chirgwin on (#1ZZHY)
Even hackers are worried about the Internet of S**t backlash The success of the Mirai botnet was apparently a shiver looking for a spine to run up: HackForums has killed off its “server stress test†DDoS-for-hire section.…
|
|
by Simon Sharwood on (#1ZZG6)
Redmond reckons open source hardware needs Alphas to fork with, just like open source code Microsoft thinks the Open Compute Project (OCP) moves a bit too slowly, so has tossed out some half-baked server designs in an effort to speed things along.…
|
|
by Richard Chirgwin on (#1ZZDH)
Amazon and Huawei sales up, everyone else is drooping It sounds like a big number, but the 43 million tablets that shipped in Q3 2016 are a disaster for vendors, according to prognosticator IDC.…
|
|
by Shaun Nichols on (#1ZZ6X)
Study finds dial-a-car services also tend to overcharge women Passengers who use Uber and Lyft to dial up rides are often subject to racial and gender discrimination, claim researchers.…
|
|
by Kieren McCarthy on (#1ZZ6Z)
Guess what it's over? Yep, copyright infringement Updated A subpoena can be served against Cloudflare compelling it to reveal the identities of two website owners, a New York judge has ruled.…
|
|
by Thomas Claburn on (#1ZZ35)
Native code spec gets buy-in from major browser makers Google, Microsoft, and Mozilla on Monday announced preview versions of WebAssembly, a low-level safe binary format designed to allow C/C++ code to run in web browsers.…
|
|
by Richard Chirgwin on (#1ZZ25)
Even Adobe pushed its patch faster than Windows giant Google has slung a grenade at Microsoft by disclosing a Windows vulnerability before Redmond has a patch ready. The bug can be exploited by malware on a machine to gain administrator-level access.…
|
|
by Kieren McCarthy on (#1ZYRJ)
Contrarian blood-sucker continues to confuse Billionaire venture capitalist and professional contrarian Peter Thiel hailed a new political reality this morning with another public endorsement of fellow billionaire Donald Trump just days before the US elections.…
|
|
by Iain Thomson on (#1ZYJG)
Lawmakers call for action over Rule 41 changes In one month, an obscure procedural rule tweak will come into effect allowing US cops and federal agents to hack any computer in the world using a single warrant issued anywhere in America.…
|
|
by Darren Pauli on (#1ZYGR)
Bet shops ready for old layer 3 stayers, less for IoT swoopers, says Akamai "The race that stops a nation" could also stop betting agencies if the regular barrage of timely distributed denial of service attack (DDoS) extortionists utilise insecure embedded devices, Akamai says.…
|
|
by Katyanna Quach on (#1ZYGT)
Computer-generated horrors not just limited to Microsoft Exchange updates AI can learn to speak, drive, play games, and recognise faces – but can it learn to incite fear?…
|
|
by Shaun Nichols on (#1ZYGW)
Now with less-random information wiping Apple has once again posted an update to iOS, this time to address a bug it introduced with the last patch.…
|
|
by John Leyden on (#1ZY3X)
Dubbed Linux/IRCTelnet, nasty's source code based on Aidra Miscreants have put together a new strain of malware designed to turn insecure IoT devices into a DDoS attack platform.…
|
|
by Alexander J Martin on (#1ZY0P)
Major medical issues diverted to neighbouring hospitals An NHS trust shut down all of its IT systems today and has all but ground to a halt in general after a virus compromised them on Sunday.…
|
|
by Gareth Corfield on (#1ZXTF)
If you believe that, I’ve got a bridge for sale... Lockheed Martin, designers of the super-expensive F-35 fighter jet, is working on a system claimed to reassure foreign customers that the US won't be able to read their pilots' personal data.…
|
|
by Chris Mellor on (#1ZXKR)
External drive doubles console capacity and loads titles faster Seagate has produced an external 512GB flash drive for capacity-strapped Xbox One gamers.…
|
|
by Chris Mellor on (#1ZXHW)
With 'I just casually chucked this here' magnetic stand Seagate’s LaCie unit has announced three Neil Poulton-designed Thunderbolt 3 desktop storage boxes, one being a flash drive moving data at up to 2.8GB/sec.…
|
|
by Alexander J Martin on (#1ZXE5)
In the 21st century, kids can be a real nuisance Customers of 123 Reg suffered more tricks than treats this morning when a DDoS attack hobbled the registrar's services.…
|
|
by Gareth Corfield on (#1ZX8W)
Silicon for machine learning that it hopes will 'challenge Nvidia' A Bristol upstart backed by Samsung and ARM daddy Hermann Hauser has raised $30m to make chips designed especially for machine learning.…
|
|
by Chris Mellor on (#1ZX77)
HPE adds Hitachi gen 2 VSP features to its XP7 array range-topper HPE's XP7 is an OEM'd Hitachi VSP array, which was announced in April 2014 as an update to the similar OEM'd XP.…
|
|
by Alexander J Martin on (#1ZX2K)
CEOs can hardly contain their delight American telco firm CenturyLink has announced a merger with tier-one networking business Level 3.…
|
|
by Chris Mellor on (#1ZX2N)
And store more data, of course Analysis Disk drives are getting more platters so they can be fattened up with more data.…
|
|
by John Leyden on (#1ZWZW)
Accompanying gibberish encourages disrupting US election The Shadow Brokers hacking group has posted a fresh dump containing a list of servers compromised by an NSA-linked group.…
|
|
by Alexander J Martin on (#1ZWYA)
Now IT bricks it: A 'series of extremely unlikely events' Exclusive We are two weeks into the outage issues at King's College London, and a communiqué from IT has warned staff that those issues won't be completely resolved for at least a fortnight more.…
|
|
by Chris Mellor on (#1ZWQA)
OTCQX replaces delisting NYSE as its share trading body In an astoundingly fast piece of work Violin Memory shares were listed and trading on the OTCQX market a day after the New York Stock Exchange said it was halting trading in Violin’s shares.…
|
|
by Darren Pauli on (#1ZWGJ)
And break every computer crime law along the way A GitHub user going by Leo Linsky has forked a repo created by researcher Jerry Gamblin to create an anti-worm "nematode" that could help to patch vulnerable devices used in the massive Mirai distributed denial of service attack.…
|
|
by Simon Sharwood on (#1ZWEW)
Adds double-buffered rendering to stop terminal-era flickering Software developer and Google employee Daniel Colascione has cooked up what he calls “Buttery smooth Emacs†by adding rendering code to the venerable text editor that does away with long-standing flickering and resizing issues.…
|
|
by Richard Chirgwin on (#1ZWBY)
Root? Horticulture? Geddit? Okay, on with the BSODs Entries are thinning out for our irregular roundup of Blue Screens of Death, so the series will take a break (unless, of course, readers flood us with amusing sightings).…
|
|
by Richard Chirgwin on (#1ZWAR)
Don't fence us in, sings British Infrastructure Group Parliamentary bloc the British Infrastructure Group (BIG) has dropped something of a bombshell, calling for Ofcom to push roaming between mobile carriers.…
|
|
by Simon Sharwood on (#1ZW82)
Wix admits to code sniff, says it groks the GNU vibe WordPress daddy Matt Mullenweg says the editor offered by drag-and-drop website-builder Wix.com “explicitly contravenes the GPL†(GNU General Public License) and “is built with stolen code, so your whole app is now in violation of the license.â€â€¦
|
|
by Richard Chirgwin on (#1ZW7B)
'Scout' scope gives us an asteroid-misses-Earth-by-not-much horror story for Halloween NASA's pleased with its still-under-development asteroid-hunting program after it spotted a 25-metre rock that buzzed Earth at about 1.3 times the distance to the moon on the weekend.…
|
|
by Richard Chirgwin on (#1ZW4Z)
Crew threw it in a bucket of water before things got nasty Perhaps more airlines could install more phone pockets on seats: two more instances have emerged of crushed smartphones putting aircraft at risk.…
|
|
by Darren Pauli on (#1ZW21)
Certificate Transparency for Chrome will ruin phishing spots by Oct 2017 Criminals are about to lose a reliable attack vector for malware infection and phishing, thanks to Google's Certificate Transparency initiative that will force websites to enforce proper certificate security within a year.…
|
|
by Darren Pauli on (#1ZW17)
Cuts aviation safety IT positions to 265 AirServices Australia is set to axe around 50 jobs across its IT department as part of sweeping cuts that could see 900 positions cut.…
|
|
by Simon Sharwood on (#1ZVWC)
We hear the ban is biting as buyers tire of waiting The United States International Trade Commission (ITC) has “instituted a formal enforcement proceeding†relating to the ban on Arista importing certain networking kit.…
|
|
by Simon Sharwood on (#1ZVSS)
Cash for new reporting tool, of which we already have two, plus smuttmeister research Australia's Department of Communications has found AU$4.8m to “go towards the development of a national online reporting tool to help counter the effects of non-consensual sharing of intimate images,†otherwise known as revenge porn. But the department doesn't know just how the money will be spent, or whether it will result in duplication of existing infrastructure.…
|
|
by Richard Chirgwin on (#1ZVRZ)
Mid-morning bulk buys signal raids on newly-expired domains and evil intent A group of American boffins is loosing artificial intelligence on Web scams, demonstrating that analysis of domains at the time of registration can provide an early warning of those that will later be home to spammers and scammers.…
|
|
by Darren Pauli on (#1ZVJP)
Bug bounty still bearing bugs. Mozilla has shuttered more than 130 serious vulnerabilities reported by community hackers this year.…
|
|
by Simon Sharwood on (#1ZVD6)
'Regeneration' splinter party will likely be the captain-maker Iceland's Pirate Party has won ten seats in the nation's 63-seat parliament, the Alþingi.…
|
|
by Richard Chirgwin on (#1ZVC4)
Investigation replicates cryogenic helium #FAIL VIDEO Conspiracy theorists can stop looking for a grassy knoll near SpaceX's Cape Canaveral launch complex: the company reckons it's close to explaining why its September launch failed so spectacularly.…
|
|
by Richard Chirgwin on (#1ZVB5)
iCloud and iTunes on Windows also need patching Apple has published security updates for Xcode, iCloud for Windows, and iTunes for Windows.…
|
|
by Katyanna Quach on (#1ZQFN)
Design could nail Feynman Grand Challenge Scientists at the University of California, Santa Barbara have developed a design of a working nanoscale computing device that could complete the Feynman Grand Challenge.…
|
|
by Iain Thomson on (#1ZPS4)
RoboSimian up in smoke after engineering error Samsung might think it's the king of exploding kit, what with smartphones and washing machines going up in flames, but in June NASA engineers schooled the firm on how to really make a bang.…
|
|
by Katyanna Quach on (#1ZNYN)
And humans don't understand how it works Neural networks trained by researchers working at Google Brain can create their own cryptographic algorithms – but no one is quite sure how it works.…
|
|
by Iain Thomson on (#1ZNX0)
Home IP, check. Own email, check. Arrest, certain A newly unsealed indictment has detailed accusations of what appears to be one of the most inept pieces of computer crime in recent history.…
|
|
by Thomas Claburn on (#1ZNV8)
Exemption allows security research, for two years at least A year late, the US Librarian of Congress on Friday published an updated list of exemptions to the Digital Millennium Copyright Act's prohibition on circumventing digital access controls.…
|