-
Apr 26, 2024
The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations. For example, you can use the Wayback… read more »
-
Apr 3, 2024
Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws, which haven’t yet been patched, could potentially allow unauthorised access to user data. The news comes more… read more »
-
Mar 31, 2024
On March 29, 2024, a serious security vulnerability was discovered in the XZ Utils library. This library is used by many Linux distributions for data compression. The vulnerability, which has been assigned the CVE identifier CVE-2024-3094, is a backdoor that… read more »
-
Mar 26, 2024
Procrastination is the act of delaying or postponing a task or set of tasks. So, how do you stop procrastinating? Here are eight tips: The 2-Minute Rule If a task takes less than two minutes to complete, do it right… read more »
-
Jan 28, 2024
Today I’d like to show you my setup for integrate the pass password manager into the i3 desktop environment using a Bash script. The script is designed to automatically fill in the user and password fields in login forms, and… read more »
-
Dec 8, 2023
In a letter to the Department of Justice, Senator Ronnie Wyden reveals that foreign governments have been spying on how American citizens use their iPhones and Android phones through push notifications. Most people don’t think much of them, but some… read more »
-
Nov 19, 2023
The Russian cyber espionage group Gamaredon, affiliated with Russia’s Federal Security Service (FSB), has been observed using a worm called LitterDrifter, which spreads through USB devices in targeted attacks against Ukrainian entities. This tactic signifies an evolution in the group’s… read more »
-
Nov 12, 2023
At first glance, the relationship between privacy on Android phones may seem complicated. Given Google’s prominent role in the advertising business, where the bulk of its revenue is generated, it can be challenging to reconcile the idea of data collection… read more »