Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Apple's iCloud Easy to Crack with Existing Tools

Two days ago we reported on the iCloud controversy which involved an attack on Apple’s Cloud based Find My iPhone application. This attack (which appears to have been a dictionary attack) resulted in the release of nude images of a number of celebrities posted on the internet for all to see. Apple immediately jumped to the defensive and released a statement saying they were not “hacked” and it is not their fault. Now on the surface this is true as there was not a full breach of their security, but it is about as wrong as you can get.

Details
By Sean Kalinich
Sean Kalinich
Sep 04
Hits: 7370
  • Apple
  • Hacking
  • Security
  • Breach
  • Elcomsoft
  • EPPB
  • Phone Password Breaker

Read more: Apple's iCloud Easy to Crack with Existing Tools

No comments on “Apple's iCloud Easy to Crack with Existing Tools”
News

New Tribler BitTorrent Client adds a Tor Network for Anonymity

The words anonymity, privacy and security go hand in hand… in hand. Although the term anonymity is often seen as a bad thing by law enforcement and policy makers the truth is that it is a critical part of the security chain and is something that needs to be addressed in the way communications happen over the internet. Simply put, how can an attacker get to you if they do not know where you are coming from? Anonymity is a form of security that is in common use by the “red” team so why not put this to use in protecting the green?

Details
By Sean Kalinich
Sean Kalinich
Sep 03
Hits: 4331
  • Security
  • Privacy
  • BitTorrent
  • TOR
  • anonymity
  • Ecnryption
  • Tribler
  • Delft University ot Technology

Read more: New Tribler BitTorrent Client adds a Tor Network...

No comments on “New Tribler BitTorrent Client adds a Tor Network for Anonymity”
News

Imagination Beats A New 64-bit Drum

This morning Imagination announced their MIPS I-class 64-bit CPU family. These are the first IP cores to combine a 64-bit architecture and hardware virtualization with scalable performance through multi-threading, multi-core and multi-cluster coherent processing.

Details
By John Oram
John Oram
Sep 02
Hits: 4281
  • CPU
  • 64Bit
  • Imagination
  • MIPS
  • Architecture
  • MultiCore
  • 32Bit
  • IoT
  • New Tech
  • Warrior
  • IClass CPU
  • I6400
  • CoreMark
  • MHz
  • DMIPS
  • M2M
  • multithreading
  • multicluster
  • coherent processing
  • ecosystems
  • Stanford University
  • Ton KingSmith
  • Dr John L Hennessy

Read more: Imagination Beats A New 64-bit Drum

No comments on “Imagination Beats A New 64-bit Drum”
News

Was a Flaw in Apple's Find my iPhone Responsible for the Recent Celebrity Nude Photo Leak?

Over the weekend a number of articles broke describing a “hack” that allowed nude photos of celebrities to be stolen and then reposted on the internet (4chan). Although the story held minimal interest at the time of its release we did not see it as big news since phone and cloud service hacks are far too common these days, just because it happened to be someone famous did not make it anymore news worthy. If anything it made it less as you should not be storing nude or explicit images of yourself on your phone or in any cloud service these days.

Details
By Sean Kalinich
Sean Kalinich
Sep 02
Hits: 3383
  • Apple
  • Security
  • Privacy
  • Data Theft
  • iCloud
  • Breach
  • Hack
  • Find My iPhone

Read more: Was a Flaw in Apple's Find my iPhone Responsible...

No comments on “Was a Flaw in Apple's Find my iPhone Responsible for the Recent Celebrity Nude Photo Leak?”
News

Are PCI Compliance Regulations Being Ignored and Allowing for More Data Theft?

It won’t happen to me is the battle cry of far too many companies these days when it comes to security. We have watches this mind set over the course of the last two years as businesses try to get out of the expense (time and money) needed to update or properly protect their companies and customers from data theft. One of the very recent and troubling ones is the Backoff malware that has hit an estimated 1,000 US businesses. Even Dairy Queen has been hit and consumer payment card data stolen.

Details
By Sean Kalinich
Sean Kalinich
Aug 29
Hits: 3108
  • Hacking
  • Security
  • Data Theft
  • Breach
  • PCI
  • Payment Card INdustry

Read more: Are PCI Compliance Regulations Being Ignored and...

No comments on “Are PCI Compliance Regulations Being Ignored and Allowing for More Data Theft?”

More Articles …

  1. Apple Bans Devs from Selling HealthKit Data to Ad Companies
  2. TSMC and Samsung to have 14/16nm FinFET early while Intel delays
  3. Amazon Buys Twitch... but to what end?
  4. NSA Bug Leaks to Tor No Big Surprise
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

Page 54 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech