From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 598 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1507 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1056 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 905 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2078 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1790 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2063 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2051 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1823 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116470 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87373 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81923 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80248 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70875 times Read more...
Displaying items by tag: Cloud Computing
Amazon Web Services Suffers Two Outages In Less Than 30 Days... Is the Cloud Really Safe?
Over the weekend there were storms through northern Virginia that left many without power. One of these was an Amazon Cloud Computing node that housed Netflix, Pinterest, Instgram, Heroku and a few others were impacted. Ok Impacted is putting it mildly, due to the loss of power those services were offline for at least 6 hours starting Friday night and moving into early Saturday Morning.
Google to Start Issuing Warnings About Possible State-Sponsored Attacks on GMail Accounts; Who Are These For?
In other “hacking news” two days ago Google announced that it would begin spreading FUD…. I mean warning users about the possibility that their computer systems and Gmail accounts could be under attack by “State-Sponsored” individuals. The new came after recent discoveries that Stuxnet was a US sponsored attack and the widely held belief that Flame is also a state-sponsored bit of malware.
Cloud Computing Is Not All Blue Skies, There Are Storms Ahead Amid Privacy and Security Concerns
Earlier today we talked about how AMD’s Rory Read is looking to cloud based services to help overcome the lack of processing power available to AMD’s APUs (and other CPUs moving forward) in that article we talked (very briefly) about some of the concerns that are keeping people out of cloud based services. Although one that is commonly talked about is privacy the other (and perhaps even more important) is security.
Will Microsoft Subsidize Tablet and Ultrabook Costs with Subscriptions to SkyDrive and More? *Update*
As consumers are becoming less and less enchanted with their wireless carriers we are now hearing that Microsoft is trying to take a leaf from their book of tricks. With a wireless provider the way to get people in the door is to offer great phones (like the iPhone, Google Nexus, Galaxy III Etc) for amazing prices, but then to require a two year commitment for service. This is exactly what Microsoft might be doing with the next round or XboX hardware.
Google Tries to Own All Of Your Data With Google Drive... Just Like it Did with Chrome
There is a huge amount of traffic on Google’s new Google drive cloud storage system. There are predictions from “they will kill Drop Box and Sky Drive” to it will fail. So this is pretty much your average launch of a new Google product. One of the things that has made the rounds yesterday we were not surprised by (and frankly are shocked that other media outlets are surprised by this), this is the terms of service that seem to indicate that anything you put on Google drive belongs to Google.
Most Breaches In 2011 Were Simple Exploits That Should Not Have Happened
You know, back a very long time ago (sometime in 2007 or so) I wrote an article on how dangerous the idea of cloud computing was (and is). The article centered around the fact that in almost 99 cases out of 100 the company that is responsible for the security of your information and services are going to spend as little as possible on maintaining them and securing them. They are banking on the hope that no one tries that simple exploit or can even find the servers in question. Or for that matter they put their trust in other companies to manage their security for them. These companies then do the same thing all over again all to make sure they keep the best profit ratio possible.
FXI shows us some Cotton Candy
Ok, now this is something that looks like it is going to be very cool. Today we got word about something called Cotton Candy. We know you are probably wondering what Cotton Candy is (outside of the real cotton candy). Well, it is a new twist on an old technology. When computer networks first started the screen that was in front of you did not do much processing. In fact, most of the time it did not do any processing. All of that was taken care of by a single powerful mainframe computer and what you saw was the displayed results. Now, as we move more and more into Cloud Based computing we are returning to that style of work. Someone else does all the heavy lifting and you get the results.
FXI DEMONSTRATES ANY SCREEN CONNECTED COMPUTING
USB Companion Adapter Enables Screens to Access the Cloud and Mobile Content
New York, NY and Trondheim, Norway – November 17, 2011 - FXI Technologies, a hardware and software startup based in Trondheim Norway, demonstrated today the world’s first any screen, connected computing USB device. Codenamed “Cotton Candy”, this sweet little device serves as a technology bridge between any display, the Cloud, and any input peripheral.
AMD and Intel Show off New Server CPUs
At Supercomputing 2011 both Intel and AMD showed off their latest in HPC (High Performance Computing). From AMD we got a look at their new Bulldozer based. These new CPUs will ship in 8 and 16-core varieties. The 16-core flavor called the Opteron 6200 will also have four memory channels (like the Intel 3960X), 1MB of cache per core (level 2), and will top out at 3.3GHz. The 8-Core version will be the Opteron 4200 and will only have two memory channels, but will still have 1MB of L2 cache per core and a top clock speed of 3.3GHz.
VMware reinvents the Wheel
In stunning news VMware announced the reinvention of the wheel at the VMware World Conference in Las Vegas. They showed of their new “wheel” which will run slower and have a greater potential for security risks than the older wheel, but they feel that this is the way things are going to be in the future.
Of course the thing that VMware was showing off was not the wheel it was VMware’s Project AppBlast, an updated Horizon Application Manager (which now allows Windows Applications) and a new technology called ThinApp Factory. The theme was the “Post-PC Era” with CTO Steve Herrod saying such catch phrases as “the world has changed” and other nonsense considering the fact that Citrix has been out for more than 10 years and has never managed to push the PC to extinction.
The three technologies that VMware showcased today are not really new, Citrix has XenApp and even Microsoft has products that will allow you to serve up single applications to users. True the Microsoft product will not let you push out to anything other than Windows based systems but Xen can push to the iOS and even to Android in many cases. Xen also has a web interface that allows you to pick and choose the applications you want to run which are run in secured memory spaces on the client system.
We have tinkered with XenApp and XenDesktop on more than a few occasions and it is more than functional with plenty of support behind it.
So, while the new Applications from VMware are interesting they are far from revolutionary and with their expensive licensing scheme you can pretty much bet they will be pricing out of the reach of most companies.
Discuss this in our Forum