DecryptedTech

Monday27 March 2023

DecryptedTech Feed (3739)

Rate this item
(0 votes)
The Dark Web (whispered in Letterkenny) is a playground for all kinds of illegal activity. One well traded item is Personal Information including Credit Card numbers. Due to the state of security in most organizations (Stuart!) there is no shortage…
Rate this item
(0 votes)
The shift to services like AWS, GCP and more have meant that many organizations are also making a shift away from the Microsoft Windows platform and moving to a Linux centric environment and while this is a good move for…
Rate this item
(0 votes)
It seems that web site data analytics are now on the radar for privacy regulators in the EU, especially Google Analytics collection tools. Recently data protection regulators in Austria and France have rules that the collection of user data by…

Nvidia-ARM Deall off Citing Regulatory Challenges

Written by
Rate this item
(0 votes)
In September 2020 Nvidia announced that it was in talks to acquire ARM Holdings from SoftBank Group Corp. The deal was not surprising, but it did send waves through the industry. The concerns around this deal were and are the…
Rate this item
(0 votes)
The Threat Landscape is an interesting topic of discussion. It is a constantly changing thing and even the best predictions can often fall short of the actual threat. This is because in most cases, the attackers are a step ahead…
Rate this item
(0 votes)
The news has been abuzz about the $65+ Billion-dollar purchase of Activision/Blizzard by Microsoft. It has been seen as an opening shot in a new stage in the console wars and is, even now, under review by the FTC. However,…
Rate this item
(0 votes)
UEFI (Unified Extensible Firmware Interface) was designed to replace the old and outdated BIOS (Baic Input Output System). The older BIOS setup was slow and not very secure. It gave attackers several entry points for infection and persistence at that…
Rate this item
(1 Vote)
Facebook has not had the best history when it comes to handling online bullying, social stalking and even sexual abuse and exploitation. They do have and are continuing to develop tools to fight against this, but for the most part…
Rate this item
(0 votes)
The concept of the app as opposed to the application is one of those nuanced distinctions that miss many people. When it comes to a mobile device an app is a bundle that that allows the installation of an application…
Rate this item
(0 votes)
The rise of the smart device meant that more and more people were going to be using these for more than just communication. Mobile banking, mobile home automation, mobile car monitoring, you name it, there is probably an app for…
Rate this item
(0 votes)
Back in the late 90s’ the first macro viruses appeared on the scene. The leveraged a feature of Microsoft Office that allowed a malware developer to execute programmed instructions via the office interface. This new option opened a lot of…
Rate this item
(0 votes)
There has been a lot of talk about Meta’s The Reality Labs department losing $10 Billion on devilment of Metaverse. Mant articles have focused on the negative and the overall amount of money lost while others have chosen to focus…
Rate this item
(0 votes)
A vulnerability disclosed and patched in January is rearing its ugly head. Identified as CVE-2022-21882, this vulnerability affects Windows 10, 11 and Windows Server. On its own it is a significant threat since is allows for a privilege escalation that…
Rate this item
(0 votes)
The Go Programing Language (Go or Golang) was developed back in 2007 by a few engineers who were working at Google at the time. Go was launched in 2009 as an open-source programing language and it is primarily used in…
Rate this item
(0 votes)
Containers are a popular item with cloud-based infrastructure. The idea of running low-cost (from a resource standpoint) systems to handle work loads while maintaining a higher level of security is a nice one. Making this type of decision does not…
Rate this item
(0 votes)
In early January 2021 North Korean hackers were in the midst of a campaign targeting western security researchers. They were looking to gather tools, vulnerability information and anything else of value they could get. The US, after learning about this…