Rowhammer returns for more memory-meddling fun The Rowhammer attack on computer memory is back, and for the first time, it’s able to mess with bits in Nvidia GPUs, despite defenses designed to protect against this kind of hacking.… This article…
Category: The Register – Security
A software-defined radio can derail a US train by slamming the brakes on remotely
Neil Smith has been trying to get the railroad industry to listen since 2012, but it took a CISA warning to get there When independent security researcher Neil Smith reported a vulnerability in a comms standard used by trains to…
GPS on the fritz? Britain and France plot a backup plan
Cross-Channel pact aims to bolster navigation and timing tech as satellite signals face growing jamming threats Britain and France are to work more closely on technology to back up the familiar Global Positioning System (GPS), which is increasingly subject to…
UK’s NCA disputes claim it’s nearly three times less efficient than the FBI
Report on serious organized crime fails to account for differences, agency says The UK’s National Crime Agency (NCA) has hit back at a think tank after it assessed its US counterpart, the FBI, to be nearly three times more effective.……
Iran seeks at least three cloud providers to power its government
Despite loathing the USA, Iran wants providers who match NIST’s definition of cloud computing The Information Technology Organization of Iran (ITOI), the government body that develops and implements IT services for the country, is looking for suppliers of cloud computing.……
Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks
PLUS: Bluetooth mess leaves cars exposed; Bitcoin ATMs attacked; Deepfakers imitate US secretary of state Marco Rubio; and more Infosec In Brief Nvidia last week advised customers to ensure they employ mitigations against Rowhammer attacks, after researchers found one of…
You have a fake North Korean IT worker problem – here’s how to stop it
Thick resumes with thin LinkedIn connections are one sign. Refusing an in-person interview is another By now, the North Korean fake IT worker problem is so ubiquitous that if you think you don’t have any phony resumes or imposters in…
CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn
Intruders looked up how to use curl mid-attack – rookie errors kept damage minimal Huntress security researchers observed exploitation of the CVSS 10.0 remote code execution (RCE) flaw in Wing FTP Server on July 1, just one day after its…
UK Online Safety Act ‘not up to scratch’ on misinformation, warn MPs
Last summer’s riots show how some content can be harmful but not illegal The Online Safety Act fails to tackle online misinformation, leaving the UK in need of further regulation to curb the viral spread of false content, a report…
Security company hired a used car salesman to build a website, and it didn’t end well
First came the dodgy lawyer, then the explosively angry HR person, leaving a whistleblower techie to save his career On Call Welcome once again to On Call, The Register‘s Friday column that shares your stories of tech support terror and…
French cops cuff Russian pro basketball player on ransomware charges
‘He’s useless with computers and can’t even install an application’ says lawyer A Russian professional basketball player is cooling his heels in a French detention center after being arrested and accused of acting as a negotiator for a ransomware gang.……
Chinese censorship-busters claim Tencent is trying to kill its WeChat archive
Alleges Singaporean infosec outfit sent feeble legal demands to hosting company, which caved Anti-censorship organization GreatFire.org has accused Singapore infosec outfit Group-IB of helping Chinese web giant Tencent to quell its activities.… This article has been indexed from The Register…
Lovestruck US Air Force worker admits leaking secrets on dating app
Oh my sweet secret informant lover, what happened in that NATO meeting today? A lovestruck US Air Force employee has pleaded guilty to conspiring to transmit confidential national defense information after sharing military secrets information about the Russia-Ukraine war with…
Now everybody but Citrix agrees that CitrixBleed 2 is under exploit
Add CISA to the list The US Cybersecurity and Infrastructure Security Agency has added its weighty name to the list of parties agreeing that CVE-2025-5777, dubbed CitrixBleed 2 by one researcher, has been under exploitation and abused to hijack user…
Ex-ASML engineer who stole chip tech for Russia gets three years in Dutch prison
‘Whether those files were allowed to go to Russia? I didn’t ask’ A former ASML and NXP semiconductor engineer will spend three years in a Dutch prison after stealing secret chip technology from his employers and sharing it with Russia.……
Russia, hotbed of cybercrime, says nyet to ethical hacking bill
Politicians uneasy over potential impact on national security, local reports say Russia, home to some of the world’s most lucrative and damaging cybercrime operations, has rejected a bill to legalize ethical hacking.… This article has been indexed from The Register…
NCA arrests four in connection with UK retail ransomware attacks
Crimefighting agency cagey on details, probes into intrusions at M&S, Harrods, and Co-op continue The UK’s National Crime Agency (NCA) arrested four individuals suspected of being involved with the big three cyberattacks on UK retail businesses in recent weeks.… This…
Sovereign-ish: Google Cloud keeps AI data in UK, but not the support
Processing and storage for Gemini 2.5 Flash to stay in Blighty Google Cloud is attempting to ease concerns about where AI data is stored by offering organizations the option to keep Gemini 2.5 Flash machine learning processing entirely within the…
Review: How Passwork 7 helps tame business passwords
A simple interface and new roles-based capabilities make this venerable password manager an attractive proposition Sponsored feature Passwords are necessary for businesses, but look away for a minute and they quickly get out of control. If your users do things…
At last, a use case for AI agents with sky-high ROI: Stealing crypto
Boffins outsmart smart contracts with evil automation Using AI models to generate exploits for cryptocurrency contract flaws appears to be a promising business model, though not necessarily a legal one.… This article has been indexed from The Register – Security…