DecryptedTech

Thursday30 June 2022

DecryptedTech Feed (3738)

Rate this item
(0 votes)
The current threat landscape has user account compromise and endpoint takeover as the most common first acts in a security event. The methods used to accomplish this are varied but include such blockbusters as poisoned websites and URLs embedded in…
Rate this item
(0 votes)
Remember the days when browsing the internet was simple, all you had to worry about was clearing your cookies and browser history and you were fine. Ok, so it was never truly that simple, but you get my point. Now…

Reports of Stalking Via Apple Airtags

Written by
Rate this item
(0 votes)
It seems that Apple may have an issue with their AirTags, the small tracking devices that use the Apple device network to help you find items that you have put trackers on. They are similar although much more effective than…

Security and the Small Business Owner

Written by
Rate this item
(1 Vote)
“InfoSec” is a term that is most often associated with the enterprise class organization. However, information security is something that every business should be practicing. As we have talked about before the importance of building a security culture in even…

Secure Infrastructure in the distributed workplace Featured

Written by
Rate this item
(1 Vote)
There was a time when the thought of secure infrastructure would bring items like properly configured IDS/IPS, Firewalls, Switches and Routers with hefty ACLs and 802.1x to mind. However, after Covid and even a bit before the traditional walled layout…

All-in Vulnerability and Risk Management Featured

Written by
Rate this item
(0 votes)
It is a common belief that vulnerability management is nothing more than scanning and patching. However, as we have seen in many breaches and attacks, this is far from true. Vulnerability management is about understanding your organization and the risks…

Cylance PROTECT and the mystery of Script Control Featured

Written by
Rate this item
(0 votes)
As the title implies, we will be talking about Cylance PROTECT (now wholly owned by Blackberry). Our focus will not be on the inner workings, or any type of vulnerability. Our focus today will be all about Protect’s script control…
Rate this item
(0 votes)
It seems that is the time once again to talk about the relationship between software vendors and the security posture of different business verticals. Why are we beating this particular dead horse? Well with the Covid-19 Pandemic, the rush to…
Rate this item
(0 votes)
In December 2019 a new virus was detected in Wuhan China, this virus (COVID-19 or the Coronavirus) has spread rapidly through out China and the rest of the world. With its apparent ease of transmission and difficulty in detecting (early…
Rate this item
(0 votes)
The IT Security industry has spent billions of dollars on software to keep you “safe” from malware and attackers. Whether that money was spent in marketing or actual product improvement is up for debate. Still the fact remains that each…

New Tech, Stale Tech, and the Diminishing Security Skill Set Featured

Written by
Rate this item
(0 votes)
Although not a new subject here at DecryptedTech we thought it was time for us to dive into three of serious issues in the security world (out of many). The three we are covering today are emerging technologies, stale technologies…

When updates go wrong, horribly wrong Featured

Written by
Rate this item
(0 votes)
When you think about operating system updates you probably do not think about the security team. Sure, there are security patches and such, but those are on the operations team and not really pushed out by the security team. Well,…

We take a look at the Pico Pro Home Brewing Machine Featured

Written by
Rate this item
(4 votes)
Technology has brought us a ton of interesting and fun devices. We have smart phones, Smart TVs, Wireta… I mean…
Rate this item
(23 votes)
When Red Digital Cinema first announced they were looking to build a phone many people were very interested. The idea…

Dell and others move to disable Intel's Management Engine

Written by
Rate this item
(0 votes)
It seems that PC makers are not happy with the Intel’s Management Engine (IME) and the flaws that keep being found in it. The original flaw allowed attackers a clean way to compromise a system including uploading malware and exfiltrating…

Root7 Pink Himalayan Salt Shot Glasses Up on Test Bar... Featured

Written by
Rate this item
(0 votes)
Every now and then, we get a chance to take a look at something that is a little outside of the tech world. A few months ago as I was contemplating a vlog series entitled “Bits, Bytes and Beer”; we…