From The Blog
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 683 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 319 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 659 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 486 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 620 times Read more...
-
Leaked Data from Duolingo incident Shows US is most Impacted
Written by Sean KalinichDuolingo, is a language learning site (not to be confused with an LLM) and has a very large base of users. The site is a…Written on Tuesday, 29 August 2023 19:12 in Security Talk Read 1035 times Read more...
-
We talk about the Ransomware Threat Landscape with SecureWorks at Black Hat 2023
Written by Sean KalinichBlack Hat 2023 – Las Vegas, NV – One of my personal focuses is understanding the “Why” behind changes in the threat landscape. In simple…Written on Tuesday, 29 August 2023 18:26 in Security Talk Read 543 times Read more...
-
Now Patched Flaw Leverages Abandoned Reply URL found in Entra ID allows for Privilege Escalation
Written by Sean KalinichMicrosoft has not been having the greatest of months. First it was identified that a stollen MSA signing key was used by a Nation State…Written on Monday, 28 August 2023 15:39 in Security Talk Read 1266 times Read more...
-
Qrypt Looking to Attack the Inefficiencies in Quantum Encryption to make Quantum Secure Communication a Reality Today
Written by Sean KalinichBlack Hat 2023, Las Vegas – At Black Hat one of my favorite things to do is see what the latest buzzword(s)/phrases are. One of…Written on Monday, 28 August 2023 12:53 in Security Talk Read 768 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115413 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 85149 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 79471 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 78445 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 68295 times Read more...
Displaying items by tag: Copyright
China to control the Internet users even more fiercely
![]() |
A few days ago the Chinese government issued new regulations that further restrict the freedom of their Internet users. Users in China will now have to give their real names to ISPs and ISPs are obliged to delete forbidden posts and submit their own reports on such activities. In other words, the term "great Chinese firewall" just got even bigger.
The most pirated movies of 2012
![]() |
Among the various charts that are published at the end of each year, the piracy scene also has its own. Among other things, in the domain of the TV series the most pirated one was Game of Thrones. The most used torrent sharing site is, as expected, The Pirate Bay followed by Torrentz and Kick Ass Torrents.
War Z will have to change their name
![]() |
One of the most controversial games of the year, War Z will apparently be forced to change its name. Specifically, the US Patent and Trademark Office feels that the name of the game is too similar to Paramount's blockbuster movie World War Z with Brad Pitt in the lead role. Using the name War Z is currently suspended and it seems that the problematic game will eventually be forced to change its name. The deadline for filing an appeal is 90 days.
Verizon does not want to rat on porn downloaders
![]() |
Every once in a while a producer of pornographic content starts trying to take legal action against pirates. They typically focus on users of BitTorrent and similar protocols. Practically any person who has downloaded any content through BitTorrent could automatically be considered a pirate [Although this is far from reality as there are many legitimate uses for BitTorrent – Ed]. However, due to procedural and other errors they are somehow unsuccessful in their intentions.
Megaupload to be reborn as Mega with service in the clouds… encrypted clouds
![]() |
The new site from Kim Dotcom made for file sharing will be called Mega and I will be located at the web address me.ga. The service should start around January 19th of the following year and Dotcom has tried to completely separate it from anything that has to do with the U.S. This means that the hosting company, domain, and partners will not be from the U.S. making it impossible, or at least the extremely hard, to shut down the service if someone tried...
The UK Court is Not Happy With Apple's Public Statement, Gives Them 24 Hours to Fix It
![]() |
Last week we ran an article about the way that Apple chose to comply with an order from a UK judge to set the record straight about their continuous claims that Samsung copied Apple with their Tab line of products. Although many read this as an order to apologize for slandering Samsung Apple did not see it that way and chose instead to only acknowledge the fact that the UK High Court had ruled that Samsung was not guilty of infringement and then followed that up with more claims that Samsung’s Tab Copied the iPad including a misleading statement that Samsung was found guilty in the US for this.
Listener Approved Promotes Burgeoning Private Music Industry
![]() |
Listener Approved is a new company with the goal of promoting the private music industry. Artists of all ages, genres, creeds, and backgrounds can use this platform to publish their music, allow others to listen to it, and receive feedback on it. The Listener Approved application is linkable with all major social networks, like Facebook, Twitter, etc. I would dare say that Listener Approved is on the way to becoming “the” social music application.
Apple pays for their innovative clock design
![]() |
After the Swiss Federal Railways accused Apple of stealing their iconic clock design last month, the two companies have decided to establish a licensing agreement so Apple can use it in their new iOS. Shortly after the accusations were made by the SFR the two companies decided to arrange a meeting to settle this issue. Obviously Apple was aware that there is no way they could win if the Swiss company decided to sue them so they picked the gentleman’s way of sorting this out. The SFR even stated that they are proud their design is used so that was a huge sigh of relief for Apple.
Judge Orders Trial To Determin The Validity Of IP Evidence In File Sharing Cases
![]() |
There is something interesting happening in the US; ok several something’s actually and we are not sure if they are good or bad at this point. The first is that there appear to be more judges actually looking into the claims that the copyright lobby are trying to claim when they go after individuals and even corporations for copyright infringement. We have watched as precedent has been set in the form of very unusual verdicts such as one handed down recently that states Web Sites are not responsible for links posted by their members which might violate copyright. This nice ruling means that the MPAA and RIAA must prove that the links were placed on a site by the owner or that they encouraged the posting of these links. Of course we have seen that the MPAA, RIAA and other copyright holders rarely stand on ceremony and will claim a site is encouraging piracy right out of the gate (we don’t need no stinking proof). So while the ruling was rather monumental it did not stop the unsubstantiated take down requests and certainly is not going to help Megaupload or any other site in reality.
Someone Should Tell the MPAA... Don't Poke The Bear
![]() |
There is an old (very old saying); “don’t poke the bear”. It is one of those saying that people toss out to remind us that there are some things that you should just not do. It is a saying that the gang over at the MPAA, RIAA, BSA and even members of the US Government should listen to (maybe we should tell them). Unfortunately for them they have not only poked the bear, but have kicked it too. This group of people is so out of touch with the way the world works that they actually think they can control technological progress. We are talking about the constant attempts to control the internet, communications and anything that travels over it; all in the name of maintaining a broken and outdated business model.