• Composing music using the Higgs boson LHC data

    I discover it out late enough, but the project is fantastic! On Wednesday 4th July 2012, scientists at CERN announced that they had found a Higgs-like particle after analysing results from the Large Hadron Collider. After the announce, Domenico Vicinanza… read more »
  • Digital forensics on automotive infotainment systems

    It contains tons of historical data that can be useful in a after-crash analysis The current generation of automotive infotainment and telematics systems is very powerful, and offers a large set of features, like: Digital radio Satellite (GPS) navigation Bluetooth… read more »
  • Intel patches a remote code execution bug hidden in its chips since 2008

    For the past seven years, millions of Intel PCs have been potentially vulnerable Intel have announced that there is a privilege escalation vulnerability in their Active Management Technology (AMT), Standard Manageability (ISM) and Small Business Technology (SBT) products. These products provide… read more »
  • Build your own Windows worm in minutes

    Really simple-to-use tools, available to everyone! In this brief video (3' 14'’), from O’Reilly website, Chad Russell constructs a simple computer worm using one of the well known tools for malware building, “Internet Worm Maker Thing”. [embed]https://vimeo.com/215655847[/embed] Internet Worm Maker… read more »
  • How to create a strong password?

    How secure are your passwords? On WhoIsHostingThis? i found a useful infographic that explains how to create a strong password: So what constitutes the “perfect” password? If you’re serious about security, a strong password will include a mix of upper… read more »
  • Linux kernel explained, with a comic

    “What is it, and how does it work?” A funny explanation of linux kernel, made with a comic by Consolia. https://consolia-comic.com/comics/kernel I think more developers should know how the linux kernel works. Regarding it as a black box only gets you… read more »
  • The Internet is still broken

    BGP Hijacking is an actual problem that we need to solve Yesterday i have read a brief but interesting article about BGP Hijacking written by Johannes B. Ullrich, published on SANS ISC InfoSec Forum. About BGP Hijacking i have already written… read more »
  • Two open source tools to easily generate YARA rules

    If you need to generate your own rules starting from recovered evidences YARA is a tool aimed at helping malware researchers to identify and classify malware samples. Basically, write some antivirus signatures (or essentially regular expressions) and it can search… read more »