
Published in
Editorials
Sean Kalinich
06 March 2020
As Work from Home Increases with COVID-19 Cases are We Looking at a Playground for Threat Actors? Featured
In December 2019 a new virus was detected in Wuhan China, this virus (COVID-19 or the Coronavirus) has spread rapidly through out China and the rest of the world. With its apparent ease of transmission and difficulty in detecting (early…
Read 1542 times

Published in
Editorials
Sean Kalinich
06 March 2020
With More and More Hardware Flaws Found, How Will the Security Industry Respond? Featured
The IT Security industry has spent billions of dollars on software to keep you “safe” from malware and attackers. Whether that money was spent in marketing or actual product improvement is up for debate. Still the fact remains that each…
Read 1421 times

Published in
Editorials
Although not a new subject here at DecryptedTech we thought it was time for us to dive into three of serious issues in the security world (out of many). The three we are covering today are emerging technologies, stale technologies…
Read 3486 times

Published in
Editorials
When you think about operating system updates you probably do not think about the security team. Sure, there are security patches and such, but those are on the operations team and not really pushed out by the security team. Well,…
Read 3355 times

Published in
Gadgets
Technology has brought us a ton of interesting and fun devices. We have smart phones, Smart TVs, Wireta… I mean…
Read 6096 times

Published in
Gadgets
Sean Kalinich
24 December 2018
The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out Featured
When Red Digital Cinema first announced they were looking to build a phone many people were very interested. The idea…
Read 14547 times

Published in
News
It seems that PC makers are not happy with the Intel’s Management Engine (IME) and the flaws that keep being found in it. The original flaw allowed attackers a clean way to compromise a system including uploading malware and exfiltrating…
Read 5614 times

Published in
My Ramblings
Every now and then, we get a chance to take a look at something that is a little outside of the tech world. A few months ago as I was contemplating a vlog series entitled “Bits, Bytes and Beer”; we…
Read 6204 times

Published in
Shows and Events
Sean Kalinich
11 August 2017
Voice is an often overlooked big threat vector as phone fraud rises – part I Featured
Def Con 25, Las Vegas, NV – Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is…
Read 7434 times

Published in
Shows and Events
Sean Kalinich
30 July 2017
Illusive Networks says that deception everywhere is the way to go Featured
Black Hat 2017, Las Vegas, NV -When an attacker gains a foothold in a network the first thing they need to do is learn the lay of the land. They have done some research on the target to gather information…
Read 7590 times

Published in
Shows and Events
Black Hat 2017, Las Vegas, NV -The cloud has become one of those buzz words that people like to use when they want you to put your data or workloads on someone else’s computers and network. Amazon Web Services (AWS),…
Read 6414 times

Published in
Shows and Events
Black Hat USA 2017 – Las Vegas, NVThree years ago we talked with a company that had something of a change in thought process on how to protect your data. Instead of building bigger walls they wanted to make the…
Read 7560 times

Published in
Shows and Events
Sean Kalinich
28 July 2017
Attivo Networks rolls in incident response and controls into their deception Featured
Black Hat USA 2017 - Las Vegas, NV.Another company that we have the chance to sit down with was Attivo Networks. Attivo, if you are not familiar with them specialize in network deception through the use of projected systems. These…
Read 6361 times

Published in
Shows and Events
Sean Kalinich
28 July 2017
Dell talks security, document control, and air gapped networks at Black Hat 2017 Featured
Black Hat USA 2017 - Las Vegas, NVWhen you think of Dell you might get many different images that come to mind. For some they might think about the 90s and the “you’re getting a Dell Dude” guy. Others might…
Read 5398 times

Published in
Leaks and Rumors
A few days ago we published an article that covered a leaked batch of emails that showed Kaspersky has worked with the Russian Government. We also covered that the pieces of the emails that were published were completely out of…
Read 5162 times

Published in
Editorials
Questionable security practices aside, it seems that just about every "big" scandal lately has had leaked emails as some sort of component. In the latest such scandal we find that leaked Kaspersky emails are at the core of the US…
Read 5358 times

Published in
News
You have probably seen a message, or email, or even a recent Facebook post claiming that a dangerous Facebook Hacker by the name of Jayden K Smith working his way through the Facebook community and hacking user accounts with ease.…
Read 5349 times

Published in
News
Hate is a powerful item and when it spills out it can be violent, rude and many other things. Because of the power of hate found in images, media, mems, etc., many have wondered why there are not more efforts…
Read 5329 times

Published in
Editorials
WikiLeaks is at it again with their "Vault 7" releases. This time part of the dump features a nice little took kit for continued exploitation of some Linux systems. The tool kit is called OutlawCountry and is, to be perfectly…
Read 4933 times

Published in
News
For the last couple of days the world has been buzzing with news about the Petya malware. When the news of the outbreak broke on Tuesday morning, it was all about a new ransomware that was spreading around the globe.…
Read 4894 times

Published in
News
In the early 2000s AMD was on top of the world, they had a desktop processor that was what everyone wanted. AMD was handily beating Intel in terms of performance and pushing x86-64 computing out to the world. In 2006…
Read 5182 times

Published in
Editorials
Over the last couple of days, we have received information that would indicate nVidia is not moving to HBM 2 for their consumer GPUs (outside of some extremely high-end models). Instead, they appear to be focusing on improvements found in…
Read 5495 times

Published in
News
Remote management and access tools are great things for IT staff to use, but if they are not set up correctly or they have bugs hidden in the code they can quickly become a nightmare. Intel’s AMT (Active Management Technology)…
Read 9558 times

Published in
News
CD Projekt RED has found themselves the victim of both data theft and now blackmail. At least that is what we are hearing from their Twitter account. According to CD Projekt, someone has made off with information that relates to…
Read 5647 times

Published in
Editorials
Computex 2017 is done, the hangovers are pretty much gone, and what do we have to show for it? Well… we have a new fight for fanboys and review sites alike to talk about. This is the fight between AMD’s…
Read 4935 times