Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Anaheim Police caught using DRT Cell Simulators to listen in on calls

Law Enforcement surveillance is a necessary thing. It really is, but what is not necessary is when the agencies in question decide to get lazy or feel their powers extend to a larger group of people than their intended targets. This is when things get messy and from a legal stand point ugly. Over the last ten or so years law enforcement in general has made the decision to extend their surveillance programs into mass collection of data.

Details
By Sean Kalinich
Sean Kalinich
Jan 29
Hits: 3318
  • Privacy
  • NSA
  • Surveillance
  • DRTBoxes
  • Cell Simulators

Read more: Anaheim Police caught using DRT Cell Simulators...

No comments on “Anaheim Police caught using DRT Cell Simulators to listen in on calls”
News

HSBC's DDoS raises questions on how companies treat these events.

One cool thing about working in IT is that things are very predictable. You generally know how a system or application will react if you do this or that to it. This is how people find and use exploits in software and even hardware. You look at how an application works and identify ways you can use those processes against it. It is like digital judo. However, what many people do not really get is that this also works when setting up a larger organization for an attack. If you can track how they will respond to a particular threat, you can use it against them in very interesting ways.

Details
By Sean Kalinich
Sean Kalinich
Jan 29
Hits: 3049
  • Hacking
  • Security
  • DDos
  • Social Engineering
  • Attacks
  • HSBC

Read more: HSBC's DDoS raises questions on how companies...

No comments on “HSBC's DDoS raises questions on how companies treat these events.”
News

TOR releases version 5.5 of the TOR Browser Bundle; bug fixes galore

Tor has pushed out a new version of its privacy enhancing Tor Browser Bundle. We are up to 5.5 now and, according to the Tor Project it is a full stable release. The update fixes a laundry list of bugs and also covers some usability issues that have been plaguing the software for some time. One interesting note is that they are finally working on blocking ways of fingerprinting users through different mechanisms (resolution, keyboard type etc.).

Details
By Sean Kalinich
Sean Kalinich
Jan 29
Hits: 3146
  • Security
  • Privacy
  • TOR
  • TOR Project
  • Proxies
  • Bug Fixes

Read more: TOR releases version 5.5 of the TOR Browser...

No comments on “TOR releases version 5.5 of the TOR Browser Bundle; bug fixes galore”
News

Oracle says they will kill off the Java Browser Plug-In... sometime in the future

It seems that the stars might finally align to remove one of the largest security holes in the history of… well history itself. Oracle is announcing that it is finally getting rid of the Java Browser Plug-in… sometime. According to a blog post on the Oracle page they are aware that most (if not all) browsers are already blocking plug-ins like the one in the Java Runtime Environment. These are for security, stability and performance, and really should have been done a long time ago. Over the last few years the Java browser plug-in (along with Flash) has been the vector of choice for many web-based attacks.

Details
By Sean Kalinich
Sean Kalinich
Jan 28
Hits: 3061
  • Hacking
  • Security
  • Exploits
  • Java
  • Oracle
  • Plugin
  • JRE

Read more: Oracle says they will kill off the Java Browser...

No comments on “Oracle says they will kill off the Java Browser Plug-In... sometime in the future”
News

AMD earnings call indicates a rough 2016 ahead

AMD as a corporate entity is facing some rough times. As of their last earnings call we saw that they are still losing money and really do not have a product ready to combat this. The Rage Fury line of GPUs is doing ok in terms of sales, but as of this writing AMD has not been able to take a significant amount of market share from NVIDIA or even Intel. This is not to say that Radeon Graphics, or AMD’s APUs are bad products, it is just that they are not performing as well as the competition. In terms of the APU AMD still cannot compete with the compute power of Intel’s Core series even though the GPU side of the APU is a much better product.

Details
By Sean Kalinich
Sean Kalinich
Jan 27
Hits: 4176
  • SOC
  • AMD
  • Radeon
  • GPU
  • CPU
  • Console
  • Annual Earnings
  • Fury X9

Read more: AMD earnings call indicates a rough 2016 ahead

No comments on “AMD earnings call indicates a rough 2016 ahead”

More Articles …

  1. AMD talks up VR and the R9 Fury X dual-GPU card at VRLA
  2. The Brewie auotmated brewing machine is a standout connected device for 2016
  3. California Lawmakers push to ban the sale of encrypted smartphones
  4. AMD is delaying the launch of Zen until the end of 2016
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

Page 24 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech