Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Are Security Researchers Sitting on Vulnerabilities to Get the Most Money?

A couple of days ago we posted a story about a group of developers that complained to Valve about their lack of a Bug Bounty. In their complaint was an inference that having a form of reward would make people want to identify and report bugs and exploits in a timely manner. On the surface that would seem to make sense, but there is a flip side to this line of thinking. There will also be times when people will wait to report something to ensure they get the most money out of their efforts.

Details
By Sean Kalinich
Sean Kalinich
Jul 24
Hits: 2878
  • Hacking
  • Security
  • Exploit
  • Pwn2Own
  • Flaw
  • Vulnerability
  • VUPEN

Read more: Are Security Researchers Sitting on...

No comments on “Are Security Researchers Sitting on Vulnerabilities to Get the Most Money?”
News

TOR Vulnerability Talk at Black HAT 2014 Canceld

The TOR Project has been the go-to group when it comes to anonymity. This group and their TOR browser bundle are used by millions of people daily and not just to surf for illegal items or porn. In many cases the use of TOR allows dissidents in countries with oppressive governments to maintain connections to the outside world and also communicate. In areas like China TOR and their obfuscator project allow free access to the internet despite the great firewall of China.

Details
By Sean Kalinich
Sean Kalinich
Jul 23
Hits: 2780
  • Security
  • Exploit
  • TOR
  • CERT
  • Black Hat 2014

Read more: TOR Vulnerability Talk at Black HAT 2014 Canceld

No comments on “TOR Vulnerability Talk at Black HAT 2014 Canceld”
News

AMD looking to Stacked DRAM for Future APUs

One of the items we have always beat AMD up on is there poor memory performance in their CPUs and APUs. This little issue is what has separated AMD from Intel since the AM2 days. It has always been understood that latency has a massive impact on an internal memory controller. As you latency increases your efficiency decreases. You can offset some of this by enlarging your cache and also optimizing the CPU to use it more efficiently. This is one area that AMD has traditionally had issues with, even going back to the Athlon 64 we saw them reducing cache sizes to remove problems and bump performance.

Details
By Sean Kalinich
Sean Kalinich
Jul 23
Hits: 4206
  • AMD
  • Performance
  • APU
  • Memory
  • Computing
  • Exascale
  • Stacked DRAM
  • HBM

Read more: AMD looking to Stacked DRAM for Future APUs

No comments on “AMD looking to Stacked DRAM for Future APUs”
News

Battlefield Hardline Delayed until Ealry 2015 to Improve The Game from Top to Bottom

Remember all of the jokes about EA putting out games before they were ready? I do and many of them were very funny. Apparently someone at EA might have read them too and while we can picture them having an amused chuckle at first they might have also been a little concerned. Around the time that E3 was happening EA made comments to the effect that they would no longer push games out the door before they were ready. We all looked on with a look of “yeah right” on our faces and waited for the next unfinished game to hit the streets.

Details
By Sean Kalinich
Sean Kalinich
Jul 23
Hits: 2474
  • Gaming
  • Dice
  • EA
  • First Person Shooter
  • Beta
  • Battelfield
  • Battlefield Hardline

Read more: Battlefield Hardline Delayed until Ealry 2015 to...

No comments on “Battlefield Hardline Delayed until Ealry 2015 to Improve The Game from Top to Bottom”
News

New tracking method found that creates a fingerprint for your system

In 2012 ago we heard about a new type of internet tracking that involved making every computer identify itself and then following that ID around. At the time we thought the idea was very interesting. What we did not know was that the technology was already being worked on and ready for testing. The new type of identification was put together after very strict laws were put in place about the use of tracking cookies. Data miners and advertising companies needed a new method to see what you were doing.

Details
By Sean Kalinich
Sean Kalinich
Jul 22
Hits: 2603
  • Security
  • Privacy
  • Tracking
  • Cookies
  • Canvas Fingerprinting
  • AddThis

Read more: New tracking method found that creates a...

No comments on “New tracking method found that creates a fingerprint for your system”

More Articles …

  1. Security Expert claims iOS "Undocumented Services" allow for data collection
  2. NVIDIA launches the Shield 8-Inch Tablet
  3. Italy blocks Mega after getting off of the Special 301 Report Watch List
  4. Developers complain about Valve security and get a reply
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67

Page 63 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech