News and Editorials

News and Editorials (3296)

Voice is an often overlooked big threat vector as phone fraud rises – part I
Published in Shows and Events
Def Con 25, Las Vegas, NV – Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is…
Illusive Networks says that deception everywhere is the way to go
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -When an attacker gains a foothold in a network the first thing they need to do is learn the lay of the land. They have done some research on the target to gather information…
CloudPassage Looks to secure your entire cloud infrastructure
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -The cloud has become one of those buzz words that people like to use when they want you to put your data or workloads on someone else’s computers and network. Amazon Web Services (AWS),…
Vera jumps into the document control market with both feet
Published in Shows and Events
28 July 2017
Rate this item
(0 votes)

Vera jumps into the document control market with both feet Featured

Black Hat USA 2017 – Las Vegas, NVThree years ago we talked with a company that had something of a change in thought process on how to protect your data. Instead of building bigger walls they wanted to make the…
Attivo Networks rolls in incident response and controls into their deception
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NV.Another company that we have the chance to sit down with was Attivo Networks. Attivo, if you are not familiar with them specialize in network deception through the use of projected systems. These…
Dell talks security, document control, and air gapped networks at Black Hat 2017
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NVWhen you think of Dell you might get many different images that come to mind. For some they might think about the 90s and the “you’re getting a Dell Dude” guy. Others might…
Kaspersky; the plot and ridiculousness thickens
Published in Leaks and Rumors
A few days ago we published an article that covered a leaked batch of emails that showed Kaspersky has worked with the Russian Government. We also covered that the pieces of the emails that were published were completely out of…
Leaked emails are the new "IT" when it comes to swaying the debate
Published in Editorials
Questionable security practices aside, it seems that just about every "big" scandal lately has had leaked emails as some sort of component. In the latest such scandal we find that leaked Kaspersky emails are at the core of the US…
No, The Jayden K Smith Facebook Message is not real...
Published in News
You have probably seen a message, or email, or even a recent Facebook post claiming that a dangerous Facebook Hacker by the name of Jayden K Smith working his way through the Facebook community and hacking user accounts with ease.…
Facebook Hate Speech AI Blocking The Wrong People
Published in News
Hate is a powerful item and when it spills out it can be violent, rude and many other things. Because of the power of hate found in images, media, mems, etc., many have wondered why there are not more efforts…
New WikiLeaks Vault7 reveals show nothing that is all that new
Published in Editorials
WikiLeaks is at it again with their "Vault 7" releases. This time part of the dump features a nice little took kit for continued exploitation of some Linux systems. The tool kit is called OutlawCountry and is, to be perfectly…
What was uncle Petya really doing?
Published in News
29 June 2017
Rate this item
(0 votes)

What was uncle Petya really doing?

For the last couple of days the world has been buzzing with news about the Petya malware. When the news of the outbreak broke on Tuesday morning, it was all about a new ransomware that was spreading around the globe.…
AMD’s 11-year journey to relevance gets an epic finish.
Published in News
In the early 2000s AMD was on top of the world, they had a desktop processor that was what everyone wanted. AMD was handily beating Intel in terms of performance and pushing x86-64 computing out to the world. In 2006…
Is HBM a viable technology for GPUs? Yes, Yes it is… just not right now
Published in Editorials
Over the last couple of days, we have received information that would indicate nVidia is not moving to HBM 2 for their consumer GPUs (outside of some extremely high-end models). Instead, they appear to be focusing on improvements found in…
Microsoft finds active exploit of Intel's AMT vulnerability
Published in News
Remote management and access tools are great things for IT staff to use, but if they are not set up correctly or they have bugs hidden in the code they can quickly become a nightmare. Intel’s AMT (Active Management Technology)…
CD Projekt RED admits to data theft and blackmail
Published in News
CD Projekt RED has found themselves the victim of both data theft and now blackmail. At least that is what we are hearing from their Twitter account. According to CD Projekt, someone has made off with information that relates to…