DecryptedTech

Tuesday28 March 2023

DecryptedTech Feed (3739)

Rate this item
(0 votes)
On February 23rd, 2017, Google published a paper on their security blog that showed how a SHA-1 collision was possible. It proved that the aging cryptographic and hashing standard was no longer a safe or secure method. Google showed that…
Rate this item
(0 votes)
Universal Plug and Play UPnP) is one of those technology decisions that make you wonder what people were thinking. The concept is fairly clear, find a way to make things easy for someone to just connect a device to a…
Rate this item
(0 votes)
Facebook makes their money off their users. That is no shock to anyone considering the number of investigations currently ongoing over Facebook’s data collection practices. Of course, Facebook is not the only group collecting this type of information, they just…
Rate this item
(0 votes)
Microsoft has a history of making solid products that go nowhere. If you look at their history this is very clear from Windows Phone to Zune and more. They build it, fail to focus on penetrating the market and then…
Rate this item
(0 votes)
Microsoft’s Threat Intelligence team has recently disclosed their discovery and analysis of a new malware family. The malware in question is being tracked as a Trojan named UpdateAgent. The team has been watching as it progressed from a simple information…
Rate this item
(0 votes)
The SolarWinds supply chain attack was and still is one of the most complex and ingenious attacks that has come to light. How it was discovered is also an interesting topic for another conversation. The attack group in question is…
Rate this item
(0 votes)
Yesterday we talked about Microsoft’s plans to buy Activision Blizard as well as Sony’ plans to buy Bungie. We covered what these could mean in terms of content control and splitting console ownership into what titles people like. Although both…
Rate this item
(0 votes)
We first talked about the using the UEFI firmware as an attack vector (At Def Con 22 in 2014). Since that time there have been three identified and disclosed versions of malware that directly targeted this critical subsystem. That would…
Rate this item
(0 votes)
Tracking users and devices as they browse the web is a common thing these days and has been for many years. The technology has evolved from the original tracking cookie to some of the more advanced methods in use now,…
Rate this item
(0 votes)
Samba has released several updates that patch critical flaws in their popular Sever Message Block (SMB) freeware implementation. SMB is a protocol that allows for simple sharing of network resources and has had its share of critical vulnerabilities in the…
Rate this item
(0 votes)
The war between Microsoft’s Xbox and Sony’s PlayStation has been going on for a while. As the two companies fight it out the consumer, for the most part, has been the winner. Each new generation of console has brought with…
Rate this item
(0 votes)
WhatsApp is one of a group of relatively secure messaging services available to both iPhone and Android users. WhatsApp states that it supports full end-to-end encryption, secure deletion of messages (by the sender and receiver) as well as the option…
Rate this item
(0 votes)
Scammers and threat groups are nothing if not creative. They have time and quite a bit of talent on their hands to figure out ways around security features and gateways to get what they want. Take the recent discovery of…
Rate this item
(0 votes)
Mobile device security is not where is should be. There is just no way around this fact. The vas majority of people simple download and install an app on their phone or tablet thinking that they are not going to…
Rate this item
(0 votes)
We have all opened our emails and seen the message “you have annual security awareness training assigned”. This message is one that usually elicits eye-rolls and groans of frustration. Who wouldn’t be annoyed? After all, these trainings are simplistic, boring…

Apple Patches Safari WebKit Bug and a 0-Day

Written by
Rate this item
(0 votes)
Yesterday Apple released several patches for their different operating systems. One that we have talked about before is a core bug in Apple’s WebKit based Safari. This bug could potentially leak personal information regardless of the privacy settings you had…