Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Hacking Team's Spyware source code released to the wild after Hack

The Italian Security firm Hacking Team is now admitting that their spying software is potentially in the hands of bad guys. After a hack that saw roughly 400GB of company information liberated from their systems they have been monitoring what is being released online. They have now concluded that there is sufficient source code for their monitoring applications to allow someone to mount the same style surveillance that they were providing to their clients.

Details
By Sean Kalinich
Sean Kalinich
Jul 10
Hits: 3700
  • Hacking
  • Security
  • Malware
  • Torrent
  • Surveillance
  • Hacking Team

Read more: Hacking Team's Spyware source code released to...

No comments on “Hacking Team's Spyware source code released to the wild after Hack”
News

Cross-Site Scripting Flaw found in US ID Protection Company LifeLock's site

Irony is one of those things that is not appreciated by security guys. They do not find humor in it nor do they enjoy it when someone points an ironic situation involving them out. This has to be the case for the privacy company LifeLock. A pair of security researchers (Eric Taylor and Blake Welsh) have found an interesting feature in LifeLock’s web site. The flaw allows for a cross-site scripting attack to be used to do a fair amount of damage including injecting malware.

Details
By Sean Kalinich
Sean Kalinich
Jul 01
Hits: 2835
  • Hacking
  • Security
  • XSS
  • LifeLock
  • CrossSite Scripting

Read more: Cross-Site Scripting Flaw found in US ID...

No comments on “Cross-Site Scripting Flaw found in US ID Protection Company LifeLock's site”
News

Search results begin on page 2, Google is accused of skewing search results again

When you use a search engine like Yahoo or Google you expect to get relevant results for your efforts.  In many cases this does really happen, but often times we enter what we are looking for and find very little that relates to the actual search. One of the reasons for this is (and has been for a long time) the ability of search providers to artificially alter the search results through internal ranking systems.  Google and Yahoo both have done this in the past and in some cases with good reason.

Details
By Sean Kalinich
Sean Kalinich
Jun 30
Hits: 2922
  • Google
  • Siri
  • Search
  • Yahoo
  • Rankings

Read more: Search results begin on page 2, Google is...

No comments on “Search results begin on page 2, Google is accused of skewing search results again”
News

Cisco SSH key bug in virtual security appliances leads to some questions

Cisco has acknowledged (and released patches for) a fairly serious security bug in three of their virtual appliances that, oddly enough, are related to security. The three products in question are the Cisco Web Security Virtual Appliance, the Email Security Virtual Appliance and the Security Management Virtual Appliance. These three devices all share a default preinstalled SSH encryption key. This meddlesome little fact means that it is very simple to get into an SSH session because you can grab the key off of another copy of the product. We are pretty sure that the default keys are already floating around on the internet somewhere as well.

Details
By Sean Kalinich
Sean Kalinich
Jun 29
Hits: 3166
  • Hacking
  • Security
  • Cisco
  • Vulnerabilities
  • SSH Buy

Read more: Cisco SSH key bug in virtual security appliances...

No comments on “Cisco SSH key bug in virtual security appliances leads to some questions”
News

Microsoft is determined to make Windows fail, Forces Updates on Windows 10 *** Updated***

Over the course of its development there has been a lot to like about Windows 10. There seems to be a good blend of the traditional Windows desktop with some of the touch-centric features that Microsoft tried to force in Windows 8. You are also getting more than a few performance improvements including DX12. If you have not heard about all of the goodness in DX12 you are in for quite a pleasant surprise. However, despite all of the good there is in Windows 10 there seems to be a group at Microsoft that have still not learned lessons from the past.

Details
By Sean Kalinich
Sean Kalinich
Jun 29
Hits: 5159
  • Windows
  • Microsoft
  • Updates and Patches
  • Windows 10

Read more: Microsoft is determined to make Windows fail,...

No comments on “Microsoft is determined to make Windows fail, Forces Updates on Windows 10 *** Updated***”

More Articles …

  1. Microsoft dropped an Xbox 360 Virtual Console into the Xbox One
  2. Bethesda shows off DOOM, Fallout 4 and Dishonored 2 at E3
  3. Intel Launches new Broadwell CPUs with Iris Pro at Computex
  4. VPN Service Hola Leaves you vulnerable to tracking and hacking...
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36

Page 32 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech