Featured Content

Dell and others move to disable Intel's Management Engine
Published in News
It seems that PC makers are not happy with the Intel’s Management Engine (IME) and the flaws that keep being found in it. The original flaw allowed attackers a clean way to compromise a system including uploading malware and exfiltrating…
Root7 Pink Himalayan Salt Shot Glasses Up on Test Bar...
Published in My Ramblings
11 October 2017
Rate this item
(0 votes)

Root7 Pink Himalayan Salt Shot Glasses Up on Test Bar... Featured

Every now and then, we get a chance to take a look at something that is a little outside of the tech world. A few months ago as I was contemplating a vlog series entitled “Bits, Bytes and Beer”; we…
Voice is an often overlooked big threat vector as phone fraud rises – part I
Published in Shows and Events
Def Con 25, Las Vegas, NV – Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is…
Illusive Networks says that deception everywhere is the way to go
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -When an attacker gains a foothold in a network the first thing they need to do is learn the lay of the land. They have done some research on the target to gather information…
CloudPassage Looks to secure your entire cloud infrastructure
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -The cloud has become one of those buzz words that people like to use when they want you to put your data or workloads on someone else’s computers and network. Amazon Web Services (AWS),…
Vera jumps into the document control market with both feet
Published in Shows and Events
28 July 2017
Rate this item
(0 votes)

Vera jumps into the document control market with both feet Featured

Black Hat USA 2017 – Las Vegas, NVThree years ago we talked with a company that had something of a change in thought process on how to protect your data. Instead of building bigger walls they wanted to make the…
Attivo Networks rolls in incident response and controls into their deception
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NV.Another company that we have the chance to sit down with was Attivo Networks. Attivo, if you are not familiar with them specialize in network deception through the use of projected systems. These…
Dell talks security, document control, and air gapped networks at Black Hat 2017
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NVWhen you think of Dell you might get many different images that come to mind. For some they might think about the 90s and the “you’re getting a Dell Dude” guy. Others might…
Kaspersky; the plot and ridiculousness thickens
Published in Leaks and Rumors
A few days ago we published an article that covered a leaked batch of emails that showed Kaspersky has worked with the Russian Government. We also covered that the pieces of the emails that were published were completely out of…
Leaked emails are the new "IT" when it comes to swaying the debate
Published in Editorials
Questionable security practices aside, it seems that just about every "big" scandal lately has had leaked emails as some sort of component. In the latest such scandal we find that leaked Kaspersky emails are at the core of the US…
No, The Jayden K Smith Facebook Message is not real...
Published in News
You have probably seen a message, or email, or even a recent Facebook post claiming that a dangerous Facebook Hacker by the name of Jayden K Smith working his way through the Facebook community and hacking user accounts with ease.…
Facebook Hate Speech AI Blocking The Wrong People
Published in News
Hate is a powerful item and when it spills out it can be violent, rude and many other things. Because of the power of hate found in images, media, mems, etc., many have wondered why there are not more efforts…
New WikiLeaks Vault7 reveals show nothing that is all that new
Published in Editorials
WikiLeaks is at it again with their "Vault 7" releases. This time part of the dump features a nice little took kit for continued exploitation of some Linux systems. The tool kit is called OutlawCountry and is, to be perfectly…
What was uncle Petya really doing?
Published in News
29 June 2017
Rate this item
(0 votes)

What was uncle Petya really doing?

For the last couple of days the world has been buzzing with news about the Petya malware. When the news of the outbreak broke on Tuesday morning, it was all about a new ransomware that was spreading around the globe.…
AMD’s 11-year journey to relevance gets an epic finish.
Published in News
In the early 2000s AMD was on top of the world, they had a desktop processor that was what everyone wanted. AMD was handily beating Intel in terms of performance and pushing x86-64 computing out to the world. In 2006…
Is HBM a viable technology for GPUs? Yes, Yes it is… just not right now
Published in Editorials
Over the last couple of days, we have received information that would indicate nVidia is not moving to HBM 2 for their consumer GPUs (outside of some extremely high-end models). Instead, they appear to be focusing on improvements found in…
Microsoft finds active exploit of Intel's AMT vulnerability
Published in News
Remote management and access tools are great things for IT staff to use, but if they are not set up correctly or they have bugs hidden in the code they can quickly become a nightmare. Intel’s AMT (Active Management Technology)…
CD Projekt RED admits to data theft and blackmail
Published in News
CD Projekt RED has found themselves the victim of both data theft and now blackmail. At least that is what we are hearing from their Twitter account. According to CD Projekt, someone has made off with information that relates to…
Did Intel Repond to Threadripper, or just to Ryzen in General?
Published in Editorials
Computex 2017 is done, the hangovers are pretty much gone, and what do we have to show for it? Well… we have a new fight for fanboys and review sites alike to talk about. This is the fight between AMD’s…
Where are we now with VR?
Published in Editorials
01 June 2017
Rate this item
(0 votes)

Where are we now with VR?

This is going to be a little bit of a departure from how we would normally approach covering specific technology. Instead of addressing the state of hardware based on what we have actually worked with, we are going to look…
AMD Drops the Ryzen based Threadripper CPU on Computex
Published in Shows and Events
Earlier today, we talked about Intel’s response to AMD’s Ryzen success so we thought we would give some love to AMD as well. Although we are not out at Computex (again) we are still getting news from different manufacturers. We…
Intel Launches the new X-Series at Computex 2017
Published in Shows and Events
With Computex going on there has already been lots of news hitting the street about new PC gear. Everything from GPUs, Laptops, Cases, overclocking world records, you know the stuff. We have also heard that Intel has kicked a new…
Product Testing for Security Tools Must Change or Things Will Go From Bad To Worse
Published in Editorials
If you have been paying attention to the technical news lately you might have noticed more than a few articles pointing fingers back and forth between the AntiMalware company Cylance and the… well the industry. The argument (if you have…
Conumers have a blind spot when it comes to IoT and Security
Published in Editorials
The Internet of Things, or IoT, Connected Devices, Smart devices whatever you want to call them have become a fixture in most homes. It has gotten to the point where you have to look hard to find a device that…
AMD shoots for relevancy in 2017 with Ryzen
Published in News
09 January 2017
Rate this item
(0 votes)

AMD shoots for relevancy in 2017 with Ryzen

Since the ATi purchase AMD has struggled with trying to compete in the CPU market. They have tried many different strategies and approaches. One even included distancing themselves from the performance market and focusing solely on mobile. This disastrous strategy…