From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 699 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1577 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1112 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1085 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2133 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1855 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2124 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2098 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1891 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116524 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87479 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 82031 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80335 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70988 times Read more...
Displaying items by tag: Technology
Samsung and Apple leading the technological companies in revenue
Fortune has released their new list of the top 500 global companies ordered by revenue and among the technology companies best position were occupied by Samsung and Apple, not much of a suprise.
Hollow optical fiber achieves true speed of light
Although the optical fiber (which is increasingly replacing copper connections) transfers light, it does not travel at the speed of light like it does in vacuum. So instead of the maximum speed of light of about 300,000km/s, in a fiber optic light it is traveling at top speeds for the media - glass, which is about 200,000 km/s, making it slower for a third of the usual speed achieved in vacuum.
3D printers in the fashion world
Until now, 3D printers were mainly present in engineering and geek domain, but now they have apparently become a part of the mainstream when it comes to a private fashion show at Ace Hotel in Manhattan where Dita Von Teese was wearing dress printed entirely in 3D printer. It is not exactly a dress someone would wear every day as it is made from a pure nylon material, but it is a concept that demonstrates that the 3D printing technology can create garments too.
Scientists developed self-repairing wire
The biggest problem with wires in general is that they can tear. Researchers at the University of North Carolina State, in the video below demonstrate how their wire which consists of a core of liquid metal and the layer (insulation) of the polymer itself can be "cured", that is connected, even when it is fully Cut off with scissors.
Should we be more concerned about privacy now?
The election is over and nothing much has changed as far as the balance of power in the US, which makes us wonder if we should be concerned about a free and open internet more than ever. We know that the head of the MPAA Chris Dodd has close ties to the Whitehouse and also to many members of Congress. To make things worse Dodd will be free to openly interact with all of his former buddies sometime in February of 2013. We know that he has, and still is, pushing for laws to monitor and control the internet to protect the interests of the other members of his cartel. However, there is more to this dynamic than we first saw last year during the barrage of ignorant and oppressive laws trying to limit communication (and technological advances) and it has to do with a particular mindset.
Technology and Zombies Don't Mix
If you're like most gamers, the thought of the impending zombie apocalypse has probably crossed your mind. Where would you go? How would you get food? Where would you meet up with your loved ones? How would you avoid becoming infected? How would you do this without technology? All great questions to ask.
Judge Throws Out Apple Privacy Abuse Allegations Because It Is "routine commercial bahavior"
Wow… I can remember rather vividly trying to get out of trouble for doing something as a kid with the rather flimsy excuse of “but everyone is doing it”. To make a long story short here, that did not work and I had to face my consequences over my misdeed. So if that excuse does not work with my parents (and believe me it does not work with a traffic cop either). How is it that corporations can get away with it?
DecryptedTech Officially Launches Our Reader Driven Blogs
DecryptedTech is happy to officially launch our Reader Drive Blogs. All of the sections are open now and available for posting (if you have over three posts on our Forum). We are not kicking this month off with the theme but are open to any technology related topic. Below are the rules for posting please take a look at them before you head over and sign up. This month's prize is an Asus M4A89TD Pro with an AMD Phenom II x4 965 CPU. If you have any questions comments or concerns please use the contact us link located on our mainpage, or email us This email address is being protected from spambots. You need JavaScript enabled to view it.
Good luck and happy Blogging!
1. NO Plagiarism! Do not copy anyone else’s work. Any articles that are found to be copied from another source will earn the guilty party a two week vacation. Please make the Articles and reviews your own.
2. Please avoid politics, religion, and “adult topics” we would like this to stay in the technology realm. If you have any questions PM a member of the staff or email the board This email address is being protected from spambots. You need JavaScript enabled to view it.. This includes leaving profanity out of all submissions.
3. Source your work. If you are writing about something that you saw on another site, you MUST source it. The same goes for using anyone else’s images even if they are the manufacturer’s images you must source the main page of the site and credit their work.
4. To be suitable for submission all articles must be at least three paragraphs long. Reviews must cover performance and user experience. They should as a minimum cover the company, packaging, setup (if any), use, value, and have a conclusion that sums up the review.
5. All articles submitted are subject to moderator approval. When you post your article will not be live right away we will read it and check your facts and sources.
6. Do not write anything that can be considers libelous. This is writing something that is completely false and defamatory to another individual or company. Anyone that submits an article or review that is found to have libelous content will earn a two week vacation from the entire forum. Repeated behavior of this type will earn you a permanent ban.
7. Each month on the last day of the month voting will begin. The voting will run for four days and the article with the most votes will be published on our main site page under the author’s name. The winner will also receive the prize for that month which will be stated by the 5th day of each month
8. All submissions are the property of DecryptedTech.com. We grant the original author unlimited rights to re-publish their work as long as it is linked back to the original posting. If an article is published on our main site page the link must point back to that and indicate that it was the winner of our Reader-Blog Monthly contest.
9. These rules are subject to change without notification. However, we will make every effort to notify our readers of any changes in advance.
10. NO flaming or derogatory comments will be allowed. If you comment on an article or review please make them constructive. All comments will also be moderated and reviewed before they are allowed.
11. By submitting an article you are agreeing to abide by these rules
DecryptedTech Launches Reader Driven Blogs
One thing that I am always interested in is input from others. No matter where I have worked (or what sites I have written for) I have taken the input from readers, manufacturers and even PR companies into account. The reason for this is that no matter what is said (even negative comments can be helpful) there is something to learn. Now, don’t get me wrong, I hate it when it turns out I made a mistake or I misunderstood something or even worse… was just dead wrong. However, it happens and I deal with it.
By now I am sure you are wondering what in the world I am going on about… well it was during a conversation with a reader that I began to come up with an idea. Every site has guest writers and guest bloggers. These are usually famous analyst with names that the sites hope will bring readers (both ones that like the analyst and ones that don’t). But why should they be the only ones that get to voice their opinion, ideas, observations and thought? Truth be told they should not.
DecryptedTech is happy to announce that starting in November we will be opening a user’s blog on our forum. These articles will be written by our readers for our readers. You will have to be a registered member to read these articles. Once you reach 10 posts (real ones not spam…) you gain full access to the blog pages; once you do you will be able to submit your articles and blogs. All articles will be subject to review by a member of DecryptedTech Staff for appropriate content (no political or religious articles please) full rules will be posted inside the blog area. Each month the community will chose the best article (or review) and that will be published on our main site. The winner author will also win a prize to be determined each month.
The Prize for November will be an Asus M4A89TD Pro complete with an AMD Phenom II X4 965 C3 CPU.
We will open the new section shortly and look forward to reading what everyone has to offer.
Discuss in our Forum