DecryptedTech Feed
Rate this item
(0 votes)
There is a story running around the internet that says Google is now processing one million piracy take down requests in a single day. Now there are two different spins to this story (and we will cover both) out there.…
Wednesday, 20 August 2014 15:43

Will NVIDIA have a 20nm GPU This Year?

Written by
Rate this item
(0 votes)
Not all that long ago we reported that there was a chance that nVidia might skip over the 20nm half-node and move to the next full node in line due to issues that TSMC has been having with their 20nm…
Tuesday, 19 August 2014 16:25

CMStorm Devastator Gaming Combo Pack Review Featured

Written by
Rate this item
(0 votes)

Cooler Master’s CMStorm group has built up a reputation for making good gaming peripherals. Over the years we have seen them put out everything from mechanical keyboards to customizable mice and even gaming headsets. For the most part these offerings have been on the pricier side of the market, but in the recent months they have been working on a more value oriented batch of products. One these (that we happen to have in the lab) is a keyboard and mouse combo, the CMStorm Devastator. Is this combo set really worthy of the CMStorm name? I think we should find out.

Rate this item
(0 votes)
One of the fastest growing verticals in the PC market is the peripherals market. There are so many different companies that are pushing out keyboards, mice, headphones and more to the masses. While this growth is a good thing, it…
Rate this item
(0 votes)
Hey, remember all of those rumors that Microsoft was thinking about selling the Xbox division to someone? Well it seems that there might have been a tiny bit of truth to the basic rumor, it is just that the actual…
Rate this item
(0 votes)
If you have been on the internet at all the last few days you have probably seen all of the articles about how great DirectX 12 is and why it will be a game changer. To be fair the next…
Rate this item
(0 votes)
During Games CON BioWare has finally launched the game that it has been teasing over the last few weeks. Called Shadow Reals and set in an alternate reality Earth the game pits humans that are just awakening to their powers…
Rate this item
(0 votes)
Before DEF CON 22 started we published an article that the EFF (Electronic Frontier Foundation) was going to host a very interesting competition called SOHOplessly broken. This competition was to features a large array of common SOHO (small office home…
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV 2014 – On the last day of DEF CON 22, in oddly empty halls and with very subdued (hung over) conversations going on, I walked into what was probably the most entertaining security talks…
Sunday, 10 August 2014 01:44

All Your Hotel Room Systems are Belong to Us

Written by
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV 2014 – If you have ever stayed in a top end hotel you might find an iPad or similar tablet that allows you to control various functions of the room. This is becoming a…
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV 2014 - Over the past year or so there have been several discoveries in the aviation industry that have had security researchers and regular people very concerned. We have covered a couple of these…
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV 2014 - The idea that individual devices can monitor and control many aspects of our lives is an exciting one. Right now you can pick up inexpensive products that can allow you to keep…
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV 2014 - Yesterday at DEF CON we had the chance to listen to Christopher…
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV - The thought of getting a root kit or back door on a critical system is always a bad one. These pieces of malicious code allow an attacker to continue to exploit your network…
Friday, 08 August 2014 14:18

How do we save the internet?

Written by
Rate this item
(0 votes)
DEF CON 22, Las Vegas, NV Aug 2014 – One of the most concerning things about the future of the internet and technology in general is the fact that the “bad guys” have the advantage. We have known about this…
Rate this item
(0 votes)
The Flash Memory Summit wound down on Thursday after a four day run at the Santa Clara Convention Center in San Jose. The show floor was fairly crowded with over 5,000 attendees and a sold out exhibition space.
Rate this item
(0 votes)
Black Hat 2014, Las Vegas, NV - If you have ever had to build a network or add in a new service then you know the joys that can bring to your life. Not only do you have to plan…
Rate this item
(0 votes)
Black Hat 2014 Las Vegas, NV - The thought of a network breach or targeted attack is what keeps most systems admins up at night and constantly irritated to boot. The need to man the walls and make sure the…
Rate this item
(0 votes)
Black Hat 2014 Las Vegas, NV – Today we had the chance to talk with Karl Sigler, Threat Intelligence Manager at Trustwave who walked us through the latest version of Backoff. For those of you that do not know Backoff…
Rate this item
(0 votes)
One of the biggest issues in security is not the number of bad guys out there or the number of zero day exploits that exist in the wild. Sadly it is that far too many companies and people do not…
Rate this item
(0 votes)
Security should be a priority in any company, but it should be even more paramount in places where lives are at risk. So we have to wonder how someone ever allowed a security flaw in aircraft inflight systems that would…
Rate this item
(0 votes)
One thing I find interesting is the lack of any real memory in the technical press. It seems that the people that write about trends and events happening in the technical world often do not remember what has happened before.…
Rate this item
(0 votes)
The world is connected now, there is simply no getting around it. We have a multitude of devices that are now connected to the internet. I am not talking about security systems or cameras, I am talking about our TVs,…
Saturday, 02 August 2014 16:51

Welcome to Black Hat and DEF CON 2014

Written by
Rate this item
(0 votes)
We are on the ground in Las Vegas, NV to cover Black Hat and DEF CON 2014. We will be bringing you coverage of the latest in hacks, exploits and the tools that are supposed to protect you from the…
Rate this item
(0 votes)
In the late-90s the world was shocked when a single collection of code was able to destroy a number of computers through malicious instructions. Named Chernobyl (or CIH and Spacefilter) this virus was able to overwrite data and even the…