Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Web Site Data Analytics Gathering May Violate GDPR, Google Analytics Does.

It seems that web site data analytics are now on the radar for privacy regulators in the EU, especially Google Analytics collection tools. Recently data protection regulators in Austria and France have rules that the collection of user data by Google combined with the unregulated transfer of this information out of the country (back to the US in particular) is a violation of GDPR.

Details
By Sean Kalinich
Sean Kalinich
Feb 11
Hits: 1356
  • Google
  • Privacy
  • gdrp
  • personal data collection
  • anlytics
  • traffic data

Read more: Web Site Data Analytics Gathering May Violate...

No comments on “Web Site Data Analytics Gathering May Violate GDPR, Google Analytics Does.”
Security Talk

Strategy, Tactics, and Logistics. How They Fit into the Threat Landscape

The Threat Landscape is an interesting topic of discussion. It is a constantly changing thing and even the best predictions can often fall short of the actual threat. This is because in most cases, the attackers are a step ahead of the defenders. They have the advantage, to coin a D&D phrase, they won the initiative roll. Defenders are always waiting to see what might happen, they plan without really knowing what the attackers are going to do which means they have to be secure everywhere (not really a possibility). To help them put their resources in the right places, most security teams rely on threat intelligence feeds and an understanding of the Threat Landscape.

Details
By Sean Kalinich
Sean Kalinich
Feb 10
Hits: 1111
  • Security
  • Vulnerability Management
  • threat intelligence
  • threat landscape
  • threat actors
  • attack groups

Read more: Strategy, Tactics, and Logistics. How They Fit...

No comments on “Strategy, Tactics, and Logistics. How They Fit into the Threat Landscape”
Security Talk

Activision is Not the Only Purchase Microsoft is Eying as Rumors Pop Up Around a Mandiant Buy

The news has been abuzz about the $65+ Billion-dollar purchase of Activision/Blizzard by Microsoft. It has been seen as an opening shot in a new stage in the console wars and is, even now, under review by the FTC. However, there are rumors that Mandiant and Microsoft are in talks about a potential acquisition of the Incident Response company. These rumors come on the heels of an announcement by Mandiant that they are partnering with NextGen XDR developer SentinelOne. Where to start on this one…

Details
By Sean Kalinich
Sean Kalinich
Feb 09
Hits: 1279
  • Security
  • Microsoft
  • Incident Response
  • Endpoint Protection
  • mandiant
  • sentinelone
  • xdr

Read more: Activision is Not the Only Purchase Microsoft is...

No comments on “Activision is Not the Only Purchase Microsoft is Eying as Rumors Pop Up Around a Mandiant Buy”
Security Talk

UEFI Bootkits and Malware are Becoming More Common as Attackers Refine their Techniques.

UEFI (Unified Extensible Firmware Interface) was designed to replace the old and outdated BIOS (Baic Input Output System). The older BIOS setup was slow and not very secure. It gave attackers several entry points for infection and persistence at that level. The older BIOS standard was also susceptible to attack and compromise (think the Chernobyl BIOS virus). Something new needed to be put in place to help speed things up and help account for more complex hardware and software. Hence the UEFI was born.

Details
By Sean Kalinich
Sean Kalinich
Feb 09
Hits: 1020
  • Security
  • Malware
  • UEFI
  • Attacks
  • uefi malware
  • uefi bootkits
  • initial access groups

Read more: UEFI Bootkits and Malware are Becoming More...

No comments on “UEFI Bootkits and Malware are Becoming More Common as Attackers Refine their Techniques.”
Security Talk

Microsoft Begins Blocking their Own App Web Installer Files

The concept of the app as opposed to the application is one of those nuanced distinctions that miss many people. When it comes to a mobile device an app is a bundle that that allows the installation of an application and its dependencies like an Android APK or Linux installer package. On Windows this has been a foreign concept as the thick application installer has been the defacto for so long. The .exe and .msi application is just how things get done. With the launch of Windows 8 and the “Microsoft Store” the app came to Windows.

Details
By Sean Kalinich
Sean Kalinich
Feb 08
Hits: 1186
  • Security
  • Malware
  • Bots
  • app insatller
  • microsoft msix
  • zomebies

Read more: Microsoft Begins Blocking their Own App Web...

No comments on “Microsoft Begins Blocking their Own App Web Installer Files”

More Articles …

  1. Android Banking Trojan Medusa Piggybacking on FluBot’s Deliver System
  2. Microsoft is Finally Blocking Downloaded Macros by Default in Office
  3. CISA Sends “Patch Now” Notice on MS Vulnerability Patched in January
  4. Golang Becoming a Primary Language in the Attacker’s Tool Kit
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29

Page 25 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech