Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Concerns about an EA Origin Breach Pop Up After a Round of Password Reset Emails Go Out

There are rumblings on the internet that all might not be well with EA after a round of password reset notices appear to have been sent out on Sunday (8-13-2015). EA does not give a specific reason behind the reset notifications other than suspicious activity. However, the timing seems to correlate with an authentication exploit that has been talked about on the darker side of the internet. These claims are that a group has been silently exploiting EA’s authentication servers for months. It is far from certain that EA has suffered a large-scale breach, but it does bring up the subject of authentication server security.

Details
By Sean Kalinich
Sean Kalinich
Sep 14
Hits: 4332
  • Hacking
  • Security
  • Origin
  • EA
  • 0Day
  • Authentication

Read more: Concerns about an EA Origin Breach Pop Up After...

No comments on “Concerns about an EA Origin Breach Pop Up After a Round of Password Reset Emails Go Out”
News

AMD looking to HBM2 for their Artic Islands GPUs

Although much of the press surrounding AMD at the moment is focused on their lackluster earnings for Q2, there is some potentially good news from them. AMD’s dive into the use of High Bandwidth Memory is going to continue with their next GPU line up. According to the information available the next generation of GPUs will be code named Artic Islands and should be manufactures on a 16nm FinFET process.

Details
By Sean Kalinich
Sean Kalinich
Jul 20
Hits: 3463
  • AMD
  • Radeon
  • GPU
  • HBM
  • High Bandwidth Memory
  • Artic Islands

Read more: AMD looking to HBM2 for their Artic Islands GPUs

No comments on “AMD looking to HBM2 for their Artic Islands GPUs”
News

The Hacking Team used UEFI Rootkits for Persistent Malware

Last year during DEF CON 22 we saw a demonstration of a UEFI root kit that was extremely worrying. This root kit was installed using a multipart systems to infect the UEFI BIOS in such a way as to grant the same level of access to an attacker as the CPU has (Ring 0). It was an almost unprecedented style of attack. When we reported on this many seemed to feel that it was not an issue. Now researchers are finding evidence of this same type of attack in the data lifted from the Hacking Team.

Details
By Sean Kalinich
Sean Kalinich
Jul 16
Hits: 3066
  • Hacking
  • Security
  • Malware
  • The Hacking Team
  • UEFI BIOS
  • Rootkit

Read more: The Hacking Team used UEFI Rootkits for...

No comments on “The Hacking Team used UEFI Rootkits for Persistent Malware”
News

After multiple 0-days, many call for Flash to go away

After three spate 0-day vulnerabilities are found in your product you can pretty much expect the market to call for you go away. This is the situation that Adobe is in right now. After fighting to their little slice of dominance in the computing industry Adobe’s Flash is arguably one of the most commonly used APIs to rendering rich content. This has made them a rather large target for a number of years… well this and the fact that the Flash development team has made some rather poor choices when it comes to their application.

Details
By Sean Kalinich
Sean Kalinich
Jul 14
Hits: 2947
  • Adobe
  • Flash
  • Hacking
  • Security
  • Exploit
  • Hacking Team

Read more: After multiple 0-days, many call for Flash to go...

No comments on “After multiple 0-days, many call for Flash to go away”
News

New Flaw found in Flash Player, yes another one.

Although it will not come as a surprise, there seems to be yet another bug in Adobe’s flash player that allows for an attacker to potentially take control of a system by forcing a crash of the application. According to TrendMicro, CVE 2015-5123 is a critical bug in the latest version of Flash player for Linux, Windows, and OSX operating systems. Adobe has already released a customer advisory stating they are already aware of this flaw being exploited in the wild.

Details
By Sean Kalinich
Sean Kalinich
Jul 13
Hits: 2977
  • Adobe
  • Flash
  • Hacking
  • Security
  • Malware
  • Flaws
  • Hacking Team

Read more: New Flaw found in Flash Player, yes another one.

No comments on “New Flaw found in Flash Player, yes another one.”

More Articles …

  1. Hacking Team's Spyware source code released to the wild after Hack
  2. Cross-Site Scripting Flaw found in US ID Protection Company LifeLock's site
  3. Search results begin on page 2, Google is accused of skewing search results again
  4. Cisco SSH key bug in virtual security appliances leads to some questions
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35

Page 31 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech