From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 708 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1587 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1119 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1092 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2138 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1863 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2136 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2105 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1897 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116532 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87507 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 82047 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80343 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 71002 times Read more...
Displaying items by tag: DRM
Witcher 3: Wild Hunt to be completely DRM Free... Except on Steam
It has finally happened, a fairly large game developer has decided to release their game without any DRM (Digital Rights Management). For years the concept of DRM has been all about preventing piracy. Sadly the more money that companies put into their DRM the more the games end up costing. This rapidly rising cost perpetuates piracy even more. It is true that a large number of people that download games online end up buying the, but it still has an initial impact.
Microsoft Removes 24-Hour Check-in and Used Game Restrictions, But There are Still Concerns
Microsoft is making a rapid about face on their DRM AND use game policies. Despite their original statements that people should get an Xbox 360 if they want to play offline they are now removing the 24-hout check in period for disk based games. They are also removing the restrictions they had in place for trading and selling used games. Microsoft is claiming that they did this due to user feedback, but for some reason we think it was more about Sony’s announcement and the way gamers shifted loyalties so fast.
Don’t Like To Be Always Connected, Stick With Xbox 360…
Almost two years ago we wrote an editorial on why Microsoft had problems when it came to launching new product (and keeping them in the market). The evidence of this is quite clear in past and present products from Windows Vista to Windows 8/RT. Microsoft has its own way of analyzing market data and their own telemetry data that they collect (which they admit is a small percentage of their user base). With Windows Vista Microsoft ignored user complaints about an implementation of HDCP (High Definition Content Protection) that would be “always on” and interrogate everything a user does to make sure it is compliant with third party DRM requirements (pronounce that MPAA and RIAA), this had such a large impact on performance that the OS was quickly replaced with Windows 7.
The Xbox One Must Check-In Every 24-Hours To Keep Playing Games
Microsoft just cannot get out of their own way. First they blunder with Windows RT and how they handled its introduction with partners and developers. After that they confused and annoyed consumers by making a drastic shift in the Window 8 UI. They did all of this despite consumer feedback that showed they probably should have stuck with a more familiar UI and OS. Now Microsoft is at it again as we find out more about the Xbox One’s data connection need and the trading or reselling of games.
In-Game Piracy Used to Deter Piracy...
A video game developer has decided to use an interesting approach to piracy. Instead of trying to prevent their game from being downloaded illegally they actually pushed out their own release for people to download. Now this may sound counterproductive, but they have a plan and one that they hope will help to stop future piracy. They have decided to add piracy and its “effects” to the torrent release.
The Audience is ready for always-on DRM according to Ubisoft
Dust around the hated always-on DRM can not seem to settle. After the internet rumors that Microsoft's new gaming console could require a constant connection to the Internet, the head of Ubisoft Montreal, said that the market is ready for such an outcome. When given a question were users ready for this move Yannis Mallat said „Well, that's a question you should put to Microsoft and Sony! I would say that a lot of people are already always online through other devices – I would suspect that the audience is ready "
Ubisoft to improve Uplay
Ubisoft is preparing quite a few serious modifications to their notorious online service Uplay. Stephanie Perotti has revealed that they want to improve the relationship with the PC community, and that they are currently looking for ways to improve Uplay. First of all it seems they will try to attract gamers by bringing a wider range of games to Uplay, as well as new features and options.
The Video Game Industry, Just How Big Is It?
How big is the Video Game Industry? About 10.5 Billion dollars a year (in 2009), according to the ESRB. Only .5 Billion or so came from computer game sales, leaving the other 10 Billion or so to come mostly from dedicated game consoles. This data accounts for both new and used video game purchases, as well as rentals. According to figures from September, 2012, about half of the video game market is digital, rental, or used sales.
Ubisoft Is Claiming Massivley Exagerated 95% Piracy Rate As An Excuse To Move To the Cloud
There is certainly something going on in the software/gaming industry and from all of the information we have been able to get our hands on it is not looking good for the consumer. After showing you the reports that indicate a push for stronger control over mobile apps and that the US Government is becoming more and more interested in that space we are seeing more companies cite fantastical numbers claiming rampant piracy. This time it is our friends over at Ubisoft and the claim is that 95% of their titles are pirated.
Encrypted Bootloader on Verizon Galaxy S III Cracked
One of my favorite quotes (relating to security) is “what man can lock, man can unlock”. Another quote that I like is “they all break when you apply enough pressure”. Both of these are crucial to an understanding of security as it relates to just about everything. This includes physical security, data security; you name it… if you try to hide it or lock it up someone can get at it with enough time and resources. One place that this is often overlooked is in the department of DRM (Digital Rights Management).