Is there an unsecured wireless network near you?
Sun sets on eight domain names managed by CentralNic
Tuesday, 02 May 2017 20:06

Owners of domain names at several extensions, including .gb.com, will no longer be able to use their registered sites as of this week, with reseller CentralNic having told customers those domains have been "sunset".

The company informed customers that eight domain extensions had been "sunsetted", meaning that new registrations and renewals will not be permitted. These include users of: ar.com, .gb.com, .hu.com, .kr.com, .gc.com, .no.com, .se.com, and .uy.com.

In a letter, it told customers: "There are no plans to sunset any other domains managed by CentralNic. Although there are only a very small number of domains (and an even smaller

Up Wolf Creek without a signal: outback cable cut disconnects top end TPG, Optus customers
Tuesday, 02 May 2017 13:04

A cut to a Nextgen Networks fibre is cutting off Northern Territory Optus and TPG customers north of Katherine.

Since TPG also owns the iiNet and Internode brands, customers of those service providers are also affected.

iiNet identifies the start of the outage as yesterday on its status page, 4:19 pm Western Standard Time. At 6:15 pm WST, it posted that the cause was down to a fibre cut.

Although under the same owners, Internode apparently wasn't notified of the cause until later, since it was after 11pm Australian Central Standard Time (90 minutes ahead of WST) that the company

Cisco waves swatter at ten new vulnerabilities
Thursday, 04 May 2017 11:02

Universal Plug-and-Play remains a gift-that-keeps-on-giving for infosec researchers, with Cisco announcing a critical vulnerability in the software that plagues its CVR100W wireless VPN router.

Because the CVR100W doesn't fully range-check UPnP input data, an attacker can crash the device, possibly getting access to a root shell.

Cisco's advisory says: “This vulnerability affects all firmware releases of the Cisco CVR100W Wireless-N VPN Router prior to Firmware Release”.

The bug was reported by GeekPwn and has been patched.

Switchzilla's Wednesday patchfest this week also includes three security vulnerabilities given a high rating:

324 typo-squat domains found impersonating Natwest, HSBC and co
Wednesday, 03 May 2017 23:02
324 typo-squat domains found impersonating Natwest, HSBC and co

Pic: photoagent/Shutterstock

Hackers are abusing the trademarked names of five of the UK's top high street banks.

Security researchers at DomainTools have identified 324 "high risk" domains mimicking Barclays, HSBC, Natwest, Lloyds and Standard Chartered.

Crooks often use domains masquerading as legitimate brands to run phishing scams that trick customers into handing over login credentials. These details are subsequently used to siphon off money from compromised accounts. Dodgy sites might also be abused to spread ransomware or other malware, typically by exploiting unlatched browser or Flash Player flaws.

DomainTools used its PhishEye tool to search for existing and new domains

Former RCL director: It was me who cancelled their domain names
Wednesday, 03 May 2017 21:19

Former London biz Retro Computers Ltd’s sales agent Nick Cooper has admitted he is the man who bought two of the company’s domain names and pointed them at sites critical of the company. He is currently being sued by it over an unrelated matter.

Yesterday we reported that RCL had lost control of the two domains , zxvega.co.uk and retro-computers.co.uk.

“I am no hacker,” Cooper said. “I had these sites as well as a number of others on a domain back order service and when I got a prompt I purchased them.”

He told us he “felt compelled to ensure

Transatlantic link typo by Sweden's Telia broke Cloudflare in the US
Wednesday, 03 May 2017 05:09

A fat-fingered human accidentally broke a transatlantic internet backbone that knackered Cloudflare's content delivery network in the US.

Cloudflare – which props up loads of big names online – said that over the course of about fifteen minutes on Tuesday morning, it suffered a slowdown in traffic, meaning connections to websites were hampered. The issue was first reported around 0745 Pacific Time (1445 UTC) with a fix deployed to defuse the situation by 0759, and the problems declared fully resolved by 0853.

"The issue is related to a specific transit provider and we are working on temporarily disabling this provider

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 10 of 57