DecryptedTech Feed
Xbox Entertainment Studios Might Not Be Dead Just Yet
Published in News
Hey, remember all of those rumors that Microsoft was thinking about selling the Xbox division to someone? Well it seems that there might have been a tiny bit of truth to the basic rumor, it is just that the actual…
Microsoft’s DirectX 12 will not solve the gaming world’s problems
Published in News
If you have been on the internet at all the last few days you have probably seen all of the articles about how great DirectX 12 is and why it will be a game changer. To be fair the next…
BioWare outs new RPG game, Says it take you back to the pen and paper RPG days
Published in News
During Games CON BioWare has finally launched the game that it has been teasing over the last few weeks. Called Shadow Reals and set in an alternate reality Earth the game pits humans that are just awakening to their powers…
SOHOplessly Broken Competition Reveals 15 0-Day Flaws Cracks Four Routers Wide Open
Published in News
Before DEF CON 22 started we published an article that the EFF (Electronic Frontier Foundation) was going to host a very interesting competition called SOHOplessly broken. This competition was to features a large array of common SOHO (small office home…
The unlikely story of the War Kitteh and a Service Dog that is not a Service Dog At all
Published in News
DEF CON 22, Las Vegas, NV 2014 – On the last day of DEF CON 22, in oddly empty halls and with very subdued (hung over) conversations going on, I walked into what was probably the most entertaining security talks…
All Your Hotel Room Systems are Belong to Us
Published in News
10 August 2014
Rate this item
(0 votes)

All Your Hotel Room Systems are Belong to Us

DEF CON 22, Las Vegas, NV 2014 – If you have ever stayed in a top end hotel you might find an iPad or similar tablet that allows you to control various functions of the room. This is becoming a…
Can Aircraft Really Be Hacked Through the WiFi or Entertainment System?
Published in News
DEF CON 22, Las Vegas, NV 2014 - Over the past year or so there have been several discoveries in the aviation industry that have had security researchers and regular people very concerned. We have covered a couple of these…
The Internet of Fails, How IoT is broken and how to fix it
Published in News
DEF CON 22, Las Vegas, NV 2014 - The idea that individual devices can monitor and control many aspects of our lives is an exciting one. Right now you can pick up inexpensive products that can allow you to keep…
Changing the conversation about Privacy, Surveillance, and Pushing SSL
Published in Editorials
DEF CON 22, Las Vegas, NV 2014 - Yesterday at DEF CON we had the chance to listen to Christopher…
Hacking the UEFI BIOS Through the Windows 8 API
Published in News
08 August 2014
Rate this item
(0 votes)

Hacking the UEFI BIOS Through the Windows 8 API

DEF CON 22, Las Vegas, NV - The thought of getting a root kit or back door on a critical system is always a bad one. These pieces of malicious code allow an attacker to continue to exploit your network…
How do we save the internet?
Published in News
08 August 2014
Rate this item
(0 votes)

How do we save the internet?

DEF CON 22, Las Vegas, NV Aug 2014 – One of the most concerning things about the future of the internet and technology in general is the fact that the “bad guys” have the advantage. We have known about this…
20 X NAND-Flash Endurance! NVMdurance debuts at FMS
Published in News
08 August 2014
Rate this item
(0 votes)

20 X NAND-Flash Endurance! NVMdurance debuts at FMS

The Flash Memory Summit wound down on Thursday after a four day run at the Santa Clara Convention Center in San Jose. The show floor was fairly crowded with over 5,000 attendees and a sold out exhibition space.
Incapsula Builds a Better Web Application Firewall and then Feeds it Some Steroids
Published in News
Black Hat 2014, Las Vegas, NV - If you have ever had to build a network or add in a new service then you know the joys that can bring to your life. Not only do you have to plan…
Ionic Security wants to turn the way we think about protecting our data on its head...
Published in News
Black Hat 2014 Las Vegas, NV - The thought of a network breach or targeted attack is what keeps most systems admins up at night and constantly irritated to boot. The need to man the walls and make sure the…
Trustwave Interview, the simplest things are often the best protection
Published in News
Black Hat 2014 Las Vegas, NV – Today we had the chance to talk with Karl Sigler, Threat Intelligence Manager at Trustwave who walked us through the latest version of Backoff. For those of you that do not know Backoff…
New Synolocker Ransomware Targets unpatched Synology NAS devices running older versions of DSM
Published in News
One of the biggest issues in security is not the number of bad guys out there or the number of zero day exploits that exist in the wild. Sadly it is that far too many companies and people do not…
New Hack for Aircraft Systems To be Shown off at Black Hat 2014
Published in News
Security should be a priority in any company, but it should be even more paramount in places where lives are at risk. So we have to wonder how someone ever allowed a security flaw in aircraft inflight systems that would…
BadUSB exploit not really all that new, but still very bad indeed.
Published in News
One thing I find interesting is the lack of any real memory in the technical press. It seems that the people that write about trends and events happening in the technical world often do not remember what has happened before.…
70% of Connected Devices are Vulnerable to Hacking
Published in News
The world is connected now, there is simply no getting around it. We have a multitude of devices that are now connected to the internet. I am not talking about security systems or cameras, I am talking about our TVs,…
Welcome to Black Hat and DEF CON 2014
Published in Shows and Events
02 August 2014
Rate this item
(0 votes)

Welcome to Black Hat and DEF CON 2014

We are on the ground in Las Vegas, NV to cover Black Hat and DEF CON 2014. We will be bringing you coverage of the latest in hacks, exploits and the tools that are supposed to protect you from the…
BitTorrent is Working on an Encrypted, Anonymous Chat App named Bleep
Published in News
In the late-90s the world was shocked when a single collection of code was able to destroy a number of computers through malicious instructions. Named Chernobyl (or CIH and Spacefilter) this virus was able to overwrite data and even the…
TOR Project Warns Users of Attack that Attempted to Expose Users between January and July
Published in News
Following on the heels of the removal of a talk about unmasking users of the TOR network we are now hearing that someone has been attacking the anonymity service for the last 5-6 months in an attempt to ind out…
Crytek Sells off Homefront, Lays Off Staff in the UK and US: What was that about a secure financial future?
Published in News
Hey, remember that very upbeat and positive message that Crytek put out about securing their financial future? Well let’s just say that the happy smiles and positive tone that were in the message might have been hiding some not so…
Call of Duty: Advanced Warfare Gets a Swag Heavy Pro Edition, Just not for PC
Published in News
Every now and then you see a game developer/publisher really push the limits when it comes to the goodies they are willing to pack into a game. We have seen everything from personal drones to night vision goggles in some…
How to get the most out of your tablet when it comes to gaming
Published in News
There is a perception that to enjoy brilliant tablet gaming you have to pay big bucks – but that is not the case. There are tablets at every price that can give you this; you just need to find the…