Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Recent North Korean Internet Outages Potentially Caused by One Person with a Grudge

In early January 2021 North Korean hackers were in the midst of a campaign targeting western security researchers. They were looking to gather tools, vulnerability information and anything else of value they could get. The US, after learning about this attack did not have a significant response to the threat. Of course, the country was going through a bit of a political turmoil at the time, but there still should have been some sort of response to help prevent further attacks.

Details
By Sean Kalinich
Sean Kalinich
Feb 04
Hits: 1120
  • Hacking
  • DDos
  • Hacktivism
  • Spying
  • funk
  • north korea

Read more: Recent North Korean Internet Outages Potentially...

No comments on “Recent North Korean Internet Outages Potentially Caused by One Person with a Grudge”
Security Talk

First provable SHA-1 Collision Happened Five Years Ago Yet SHA-1 is Still an Option.

On February 23rd, 2017, Google published a paper on their security blog that showed how a SHA-1 collision was possible. It proved that the aging cryptographic and hashing standard was no longer a safe or secure method. Google showed that they could produce two different files yet have them show the same hash, thus causing a collision and getting around some of the file hashing systems in place at the time. The problem is that SHA-1 hashing is still in use today by many tools.

Details
By Sean Kalinich
Sean Kalinich
Feb 04
Hits: 1090
  • Security
  • Malware
  • Encryption
  • SHA1
  • AntiMalware
  • file hashing

Read more: First provable SHA-1 Collision Happened Five...

No comments on “First provable SHA-1 Collision Happened Five Years Ago Yet SHA-1 is Still an Option.”
Security Talk

New Vulnerability Found that Exposes a Large Number Routers to UPnProxy Attack

Universal Plug and Play UPnP) is one of those technology decisions that make you wonder what people were thinking. The concept is fairly clear, find a way to make things easy for someone to just connect a device to a network and have it function without interaction. Devices like the Xbox Series X|S require this for their remote play feature as the ports and IP addresses needed to function would be overly complicated for most users to set up. So, you enable UPnP on your router and just plug the Xbox in. Sound great, but as with anything that create convenience, it also brings about risk.

Details
By Sean Kalinich
Sean Kalinich
Feb 04
Hits: 1434
  • Wireless
  • Security
  • Malware
  • UPnP
  • Routers
  • universal plug and play
  • pnproxy

Read more: New Vulnerability Found that Exposes a Large...

No comments on “New Vulnerability Found that Exposes a Large Number Routers to UPnProxy Attack”
Security Talk

Apple iOS Privacy Changes take a $10 Billion Chunk Out of Facebook’s Ad Plans.

Facebook makes their money off their users. That is no shock to anyone considering the number of investigations currently ongoing over Facebook’s data collection practices. Of course, Facebook is not the only group collecting this type of information, they just tend to take it a bit farther than most of the other groups. Because of these invasive data collection practices many countries have tightened their laws around what can and cannot be used to develop and send out targeted ads. This has included a whole new category for “intimate” information. Even Apple has decided that this style of data collection might be out of bounds and have change their own privacy policies in iOS.

Details
By Sean Kalinich
Sean Kalinich
Feb 04
Hits: 1141
  • Facebook
  • Privacy
  • Data Collection
  • Ads
  • Big Data
  • meta
  • metaverse

Read more: Apple iOS Privacy Changes take a $10 Billion...

No comments on “Apple iOS Privacy Changes take a $10 Billion Chunk Out of Facebook’s Ad Plans.”
Security Talk

Microsoft Identifies New and Improved UpdateAgent macOS Malware

Microsoft’s Threat Intelligence team has recently disclosed their discovery and analysis of a new malware family. The malware in question is being tracked as a Trojan named UpdateAgent. The team has been watching as it progressed from a simple information stealer for the macOS to much more sophisticated capabilities including being able to bypass the macOS Gatekeeper security function.

Details
By Sean Kalinich
Sean Kalinich
Feb 03
Hits: 1191
  • Security
  • Malware
  • Trojan
  • adware
  • updateagent
  • adload

Read more: Microsoft Identifies New and Improved...

No comments on “Microsoft Identifies New and Improved UpdateAgent macOS Malware”

More Articles …

  1. SolarWinds Supply Chain Attack is the Gift that Keeps on Giving for Security Research
  2. 23 vulnerabilities found in UEFI firmware used across multiple vendors
  3. Device Fingerprinting Takes a Step Forward as the GPU Becomes the Focus
  4. Just When You Thought It Was Safe to Samba Again, New Vulnerability Allows Remote Code Execution
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31

Page 27 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech