From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 729 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1603 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1139 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1115 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2159 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1884 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2162 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2120 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1916 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116538 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87526 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 82116 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80355 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 71022 times Read more...
Displaying items by tag: SmartPhone
Malware Using Android "Master Key" Flaw Found In the Wild
Remember how everyone was up in arms over the existence of a “Master Key” bug that existed in all versions of the Android operating system? Well it looks like someone has found a way to use the flaw to their advantage. Symantec has found two apps (available in China) that use the Master Key flaw to spread a new form of malware. To give a little background the original flaw was publicly disclosed by Bluebox security on the 3rd of July 2013. It was reported to Google in February 2013. The flaw allows a malicious individual (or group) to alter an application without affecting the apps cryptographic signature. This means that the app looks exactly like a legitimate app bypassing the security at the app store and the phone level.
Future Applicances Could be Powered by Urine
As you might imagine we are all about new technologies and advancements in science, but to a point. There are times when we see people working on projects and we have to wonder why they are working on that and why they went there in the first place. This morning we ran across one of these as we were browsing the internet. It seems that British Scientists have found a way to use human urine to power a cellphone. When I read that headline I pictured someone peeing on their phone to get it charged. I know that this is not likely how it would work, but the image was there and it was followed with the question why?
The ADATA DashDrive Air AE400 Stops by the Lab
There is no doubt that the mobile market has gotten huge. Everyone is building devices to enable, extend, accessorize, and maximize the mobile experience. Mobile data usage (which really means media consumption) has gone through the roof. What is interesting about the usage numbers is that they are not all 3/4G in most cases the data is flying over public or private Wi-Fi networks. This has opened up a market for a new class of device and as you might imagine manufacturers have stepping into fill this need. The first generation was all about getting the media to your device, but was limited in a couple of ways; you could not expand the memory and also there was no way to prevent battery drain on the device you were using to access the media. This is where the second generation comes in; devices with media ports instead of fixed memory and also the ability to charge your mobile device. Today we are taking a look at the ADATA DashDrive Air AE400; let’s see what it brings to the table.
WP8 applications for Nokia Lumia 1020
In the shadow of the presentation of the new Nokia's smartphone Lumia 1020 with 41 MP camera, presentation of several applications made specifically for the device, as well as Windows Phone 8 system also happened.
Jelly Bean usage has surpassed Gingerbread
Google's latest operating system for mobile devices, Android Jelly Bean, has finally surpassed Gingerbread and has become the most common version of Android. According to data published by Google, Jelly Bean now holds approximately 37.9% of the share among all Android versions, while the share of Gingerbread is 34.1%.
Samsung and Apple leading the technological companies in revenue
Fortune has released their new list of the top 500 global companies ordered by revenue and among the technology companies best position were occupied by Samsung and Apple, not much of a suprise.
Samsung Cronus LTE WP8 smartphone confirmed
So far we've heard some rumors that the Samsung should issue in the near future a new Windows Phone 8 smartphone that carries the code name Cronus, but the South Korean company has so far declined to comment on this matter.
20 million Samsung Galaxy S4 units delivered
Samsung has delivered over 20 million units of their most advanced smartphone, Galaxy S4, the company confirmed for the Korean newspapers. The result is better than S3 managed to achieve, but the official confirmation of the information is still awaited.
Meet the Xperia Z Ultra
The Xperia Z Ultra is a new phablet on the market. This giant from Sony has a 6.4-inch screen in full HD resolution. Consistent with previous rumors, Xperia Z Ultra is the manufacturer's first smartphone that uses the screen technology called Triluminous, which first appeared on the company's upper class HDTVs and later in ultrabooks.
Samsung Galaxy S4 too with Snapdragon 800
According to information published in the user guide (PDF document), Samsung is preparing their own version of smart mobile phone Galaxy S4 based on the new Qualcomm Snapdragon 800 processor.