From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 669 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1558 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1094 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1064 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2113 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1834 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2103 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2081 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1860 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116509 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87428 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81983 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80299 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70950 times Read more...
Displaying items by tag: Twitter
Valentine ’s Day on Twitter
While some people would describe it as just consumerist holiday that should be despised, others will welcome the Valentine's with a smile on their face knowing that this day will pay special attention to their beloved ones or someone who they like (at least).
Twitter reaches 200 million
Twitter celebrated their sixth anniversary back in March. During the celebration the company announced that they had reached over 140 million active users per month and that there are around 340 million tweets made daily. [This is not a bad achievement, but it does make use wonder about the sheer amount of inane information that gets broadcast around the globe every day; 140 words at a time. –Ed]
Social Media Helps During A Disaster
By now, everyone has heard of Hurricane Sandy, dubbed by some a “Franken-storm”, which has plunged much of the East coast into chaos. Millions upon millions of civilians lost access to power, and as NYC flooded, many were forced to evacuate. There were hundreds of thousands of calls, round the clock, to emergency lines like 911. Too many calls for many people to get through without waiting for a long period of time, so, some citizens took a less common approach to getting help.
Twitter stands behind its users
After a New York court decided to request account information and tweets from Occupy Wall Street protester, Malcom Harris, Twitter responded with filling an appeal. Unlike Facebook, who has been accused of giving up their users’ data to legal institutions like it was something meaningless, Twitter has decided to stand their ground and defend their users’ privacy. Harris is being prosecuted for allegations of disorderly conduct during protests on Wall Street and information on his two accounts @destructuremal and @getsworse is being asked for by the court. For @getsworse they requested all public tweets and “[t]he following subscriber information: name; address; records of session times and durations; length of service (including creation date); types of service utilized; telephone or instrument number or any other subscriber number or identity, including any temporarily assigned network address.”
App.net – Are we getting an ad-free Twitter?
“What @daltonc (Dalton Caldwell) is doing is pretty forward. If this succeeds it will be one for the history books, for sure". Is a statement made by Kristy Tillman, Designer at Ideo. This is just one of the feeds talking about a promising project called App.net. App.net is an alternative social network that users will have to pay to use. It is imagined to be a social service where users and developers are in the spotlight instead of advertisers. Its functions are much like Twitter, you are able to follow other users and see their updates.
New Twitter Malware Tries to Exploit Our Own Curiosity and Desire To See Ourselves On The Internet
Remember the Faceboook malware we warned you about? You remember the one that relied on the fact that people love to see pictures of themselves on the internet? Well it looks like either the same group that was behind that malware or another equally clever group has moved from Faceboook to Twitter. We have heard multiple reports of tweets showing up that claim to have a link to a picture of the user. Unfortunately due to the widespread use of shortened links it is hard to spot many malicious payloads. Fortunately in this case you can identify the bad link by the .ru at the end… for now.
Twitter, Azure and Google Talk All Suffer From Outages Today; Not A Good Day For The Cloud
Today was a bad day for the cloud as first Google Talk, then Microsoft Azure, and finally Twitter all faced outages that ran into hours of downtime or intermittent problems. The incident highlights one of the problems that companies face in putting their eggs in very large baskets. The outages began with Google talk and kicked off around 4am this morning (7-26-2012). This was not a simple issue with being able to connect to the servers though, it was something more widespread.
Skype Is No Longer A Secure Means Of Communication
About two weeks ago we saw a random tweet that seemed to indicate that Microsoft had added in technology that would allow for easier spying on Skype conversations. Right after this a tweet on the YourAnonNews feed seemed to indicate that the “bug” that was accidentally sending some conversations to random members of your contact list was related to the new “feature”. There was a much more ominous tweet about an hour later that claimed Skype had been hacked and the source code downloaded. Although we never were able to confirm the relationship to the bug and the reworking of supernodes to switch to Microsoft run servers, we did find out that the released code was not the official source code, but a posting of a decompiled version of the Skype application; still useful if you wanted to look for an exploit, but not the original source code to be sure.
Is Someone Really Trying to Out "The Jester", or is He Trying to Leave with a Bang?
With all that is going on in the “hacker” world there is more drama today as someone is possibly claiming to maybe know who The Jester is. The catch, well it might be The Jester himself. To fill you in on a little background information; The Jester (also known as th3j35t3r) has made something of a name for himself in his activities against WikiLeaks, Anonymous, and other sites that do not agree with his politics. He has styled himself as a vigilante hacker and one that has the “power” to take down sites single handedly (with the right DDoS tools).
Twitter Says Users Own Thier Tweets, Files a Motion to Fight Request for Occupy Tweets
We missed this one on the 8th, but it is an important step for privacy right and the ability of the government to ask for everything they want. We had told you not that long ago how prosecutors were demanding information from Blogs, Twitter and other Social Media about people involved in the Occupy movement. This demand raised quite a storm as most felt it was an outlandish request (well actually prosecuting people for protesting is ridiculous as well) considering what they were after.