Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

Incapsula Builds a Better Web Application Firewall and then Feeds it Some Steroids

Black Hat 2014, Las Vegas, NV - If you have ever had to build a network or add in a new service then you know the joys that can bring to your life. Not only do you have to plan for power, space, cooling for the systems that actually run the service you want, but you also have to plan for all of the myriad of devices that keep this service safe from the bad guys. You have Web Application Firewalls (WAF), SSL offloading, load balancers, traditional firewalls and sometimes much more. Even with all of that you may (probably will) find yourself with a breach or hack that makes all of that work and hardware seem useless. Traditionally there is no easy way to protect a web service or site with a single solution.

Details
By Sean Kalinich
Sean Kalinich
Aug 06
Hits: 4171
  • Security
  • DDos
  • Cloud
  • Incapsula
  • WAF
  • Web Application Firewall
  • Attack Mitigation
  • Two Factor Autentication
  • Incedent Response

Read more: Incapsula Builds a Better Web Application...

No comments on “Incapsula Builds a Better Web Application Firewall and then Feeds it Some Steroids”
News

Ionic Security wants to turn the way we think about protecting our data on its head...

Black Hat 2014  Las Vegas, NV - The thought of a network breach or targeted attack is what keeps most systems admins up at night and constantly irritated to boot. The need to man the walls and make sure the moat is filled all the time is exhausting and nearly impossible in today’s moderns and increasingly distributed networks and business models. It makes the thought of a breach not a “what if”, but a “when”. This is becoming the new way of thinking about security. As we have talked about in the past people are no longer thinking they can keep everyone out, but are concentrating on quickly identifying and mitigating the inevitable breach.

Details
By Sean Kalinich
Sean Kalinich
Aug 06
Hits: 5799
  • Security
  • Data Security
  • Black Hat 2014
  • PKI
  • Key Management
  • Crypto
  • Incident Response

Read more: Ionic Security wants to turn the way we think...

No comments on “Ionic Security wants to turn the way we think about protecting our data on its head...”
News

Trustwave Interview, the simplest things are often the best protection

Black Hat 2014 Las Vegas, NV – Today we had the chance to talk with Karl Sigler, Threat Intelligence Manager at Trustwave who walked us through the latest version of Backoff. For those of you that do not know Backoff is a new threat that targets POS systems through remote desktop or other remote access systems. The vector of attack is very simple, port scan for common RDP ports, perform a basic dictionary attack on any systems found, deposit the malware and cash in on the credit card information that flows through.

Details
By Sean Kalinich
Sean Kalinich
Aug 06
Hits: 4279
  • Security
  • Malware
  • POS
  • Threats
  • Trustwave
  • Indications of Compromise
  • Backoff
  • Best Practices

Read more: Trustwave Interview, the simplest things are...

No comments on “Trustwave Interview, the simplest things are often the best protection”
News

New Synolocker Ransomware Targets unpatched Synology NAS devices running older versions of DSM

One of the biggest issues in security is not the number of bad guys out there or the number of zero day exploits that exist in the wild. Sadly it is that far too many companies and people do not update their devices and software. Now I know that it is a pain to run updates on every device you own, but in most cases these updates are important. This is the case we find with the recent brouhaha over a version of cryptolocker (SynoLocker) that appears to target Synology NAS devices with an older (and unpatched) version of Disk Station Manager (DSM).

Details
By Sean Kalinich
Sean Kalinich
Aug 05
Hits: 5426
  • Hacking
  • NAS
  • Malware
  • Synology
  • Updates
  • Patches
  • CryptoLocker
  • Ransomware
  • Synolocker

Read more: New Synolocker Ransomware Targets unpatched...

No comments on “New Synolocker Ransomware Targets unpatched Synology NAS devices running older versions of DSM”
News

New Hack for Aircraft Systems To be Shown off at Black Hat 2014

Security should be a priority in any company, but it should be even more paramount in places where lives are at risk. So we have to wonder how someone ever allowed a security flaw in aircraft inflight systems that would allow for someone to compromise the aircraft. This is the claim of security researcher Ruben Santamarta has made and he plans to prove it at Black Hat 2014.

Details
By Sean Kalinich
Sean Kalinich
Aug 05
Hits: 3420
  • Hacking
  • Security
  • Flaw
  • Black Hat 2014
  • Air Craft

Read more: New Hack for Aircraft Systems To be Shown off at...

No comments on “New Hack for Aircraft Systems To be Shown off at Black Hat 2014”

More Articles …

  1. BadUSB exploit not really all that new, but still very bad indeed.
  2. 70% of Connected Devices are Vulnerable to Hacking
  3. BitTorrent is Working on an Encrypted, Anonymous Chat App named Bleep
  4. TOR Project Warns Users of Attack that Attempted to Expose Users between January and July
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63

Page 59 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech