In September of 2015 (that would be this year) AMD announced that they were splitting off their GPU business into the Radeon Technologies Group (RTG). This move had a number of reasons (most good) and would serve to distance the…
My Quantum Computer can beat up your PC says Google and NASA
Published in News
The idea of Quantum computing has been with us since the dawn of science fiction and it is a very cool one. In recent years we have seen advances that have made this once theoretical concept turn into a reality.…
Microsoft to push even harder to get users to upgrade to Windows 10...
Published in News
Just when you thought it could not get more annoying, Microsoft has turned up the Windows 10 update notifications. The little nudges for Windows 8.x users pop up in the corner (systray) and also when you boot up your PC…
When will enough be enough when it comes to IoT security? VTech and Hello Barbie
Published in Editorials
When things are not quite right you always hope for that “ah-ha” moment when everyone realizes the issue and will actually begin to work on a solution. For connected devices we have been hoping for that since they were first…
Asetek targets Giagbyte and AMD in patent dispute with Cooler Master
Published in News
Asetek is hard at work throwing its legal muscle around and they have rolled AMD and Gigabyte into their efforts. After winning a patent suit against Cooler Master over technology found in the pumps on some of their All in…
07 December 2015
Rate this item
(0 votes)

Bendgate: it’s not just for iPhones anymore.

Not all that long ago someone found out that Apple’s iPhone was not all that strong and could be damaged with little pressure. This issue became known as Bendgate… the use of the word gate still following us from the…
It’s a failure of imagination that will always get you
Published in Editorials
Back in 2007 or so I was asked to write a white paper on the subject of why Intel was able to pass AMD as quickly as they did. This is back in the AM2+ days when Intel was dropping…
NSA mass data collection to stop in 20 days, but just on paper.
Published in News
In the post-Snowden era the idea that government agencies are spying on us is no longer the real of Movies/TV or conspiracy theorists. It is fairly well documented that this is happening every day. The question has moved from what…
It seems that at least one person is rather annoyed at AMD for making claims about certain FX series CPUs running Bulldozer cores. On November 4th the news went out that Tony Dickey had filed a class-action lawsuit on behalf…
Cybersecurity is a fairly common buzz word used in Washington these days. It is tossed around to scare people that are ignorant of the way computer systems work so that legislation that is exceptionally pro-corporate friendly and anti-consumer can be…
The cloud, IoT, vendors and security: things that do not go together.
Published in Editorials
This is not the first time that I have spoken out about cloud computing (internet based, or the Internet of Things and the way they are impacting the ability to secure a network. It is also not going to be…
08 October 2015
Rate this item
(0 votes)

NETGEAR drops the WAP720 with Ensemble Mode. We take a look Featured

WiFi is one of those services that people simply expect to see these days. When you walk into just about any public building you are going to start looking for the “free” WiFi that they have. Most people do not stop to think about that that looks like behind the scenes especially when you are in a smaller business. In a large business you have multiple wireless access points (WAPs) that are run by a central controller. This centralized control system makes it relatively simple to control both the business side and the guest side of the wireless network. These tools can be very expensive and out of the budget range for most small companies. Instead a small business will end up with either an edge device with built in wireless (and really bad service), a single WAP or multiple individual WAPs that need to be managed independently and have their own problems.

Potential New Exploit found in OpenSSL gets around latest hotfix
Published in News
It seems that someone may have found a way around at least one of the latest hot fixes for OpenSSL. According to some talk around the darker places on the internet, a rehash of metadata can allow a malicious individual…
28 September 2015
Rate this item
(0 votes)

Possible Breach At Hilton Highlights PoS Risk

Just when you thought it was safe to use your credit card we are hearing rumblings of a breach at Hilton. According to Brian Kerbs and some of our own sources a payment card breach has taken place and the…
Hackers using unencrypted satellite communication to hide C&C servers
Published in News
Security and malware research company, Kaspersky has recently released a paper describing what they say is the “ultimate level of anonymity” used by any malicious hacking group. In their report they describe a new attack by the group Ouroboros as…
Concerns about an EA Origin Breach Pop Up After a Round of Password Reset Emails Go Out
Published in News
There are rumblings on the internet that all might not be well with EA after a round of password reset notices appear to have been sent out on Sunday (8-13-2015). EA does not give a specific reason behind the reset…
The life of a security researcher is not all beer and pizza. In most cases the days are long and very few seem to appreciate what you are doing. From the stand point of a security researcher they are the…
Last year at Black Hat USA 2014 we met up with a company that was looking to make some changes in the way we protect our data, Ionic Security. The concept was very simple, but the implementation was sure to…
In addition to seeing more than a few products and ideas during Black Hat and DEF CON we also had the chance to see something really cool from the team at Trustwave. This was not a product, but a chance…
The one common thing that I keep hearing everyone talk about at Black Hat and even DEF CON is how to protect your data. It is pretty much a given that if someone wants to get into your network they…
Have you ever lost your keys and had that moment of panic where you are not sure who might have them? This is not a good feeling. You do not know if someone has them and might use them to…
One of the truths in security is that while an attacker can stay hidden they can continue to operate. In short, if you do not know about something, there is nothing you can do. Now you would think that this…
For a while now (many years actually) I have argued that the rush to turn everything into a techno-gadget has been irresponsible and dangerous. However, companies that are looking into the “Internet of things” simply do not care. They see…
AMD looking to HBM2 for their Artic Islands GPUs
Published in News
Although much of the press surrounding AMD at the moment is focused on their lackluster earnings for Q2, there is some potentially good news from them. AMD’s dive into the use of High Bandwidth Memory is going to continue with…
Last year during DEF CON 22 we saw a demonstration of a UEFI root kit that was extremely worrying. This root kit was installed using a multipart systems to infect the UEFI BIOS in such a way as to grant…