• EyePyramid, the ultimate analysis

    “Uncovering the Inner Workings of EyePyramid”, from TrendMicro (…and a small gift for Italian readers) About EyePyramid I have already wrote something, bringing mainly analyzes conducted by researchers much more prepared than me. :-) But now I need to talk again about… read more »
  • The programmer’s dilemma: write good code or stay fat?

    “I need sugar to write good code!” Funny strip from Commitstrip: how many calories do you need a day to write good code? from http://www.commitstrip.com/en/2017/01/17/how-many-calories-do-you-need-a-day-to-write-good-code/ … read more »
  • RecuperaBit, a tool for Forensic File System Reconstruction

    A python script that reconstruct filesystem structures and recover files on NTFS filesystems RecuperaBit is a python script developed by Andrea Lazzarotto useful for attempting to reconstruct a corrupted NTFS filesystem. RecuperaBit attempts reconstruction of the directory structure regardless of:… read more »
  • ZeroPhone, the Raspberry smartphone

    A completely open-source mobile phone that you can assemble for 50$ You care about your privacy? You do not trust the manufacturers of smartphones and the backdoors that can be inserted into the firmware? You fear being intercepted? With just $50… read more »
  • WhatsApp has a “Backdoor”? What’s the fact?

    The issue has nothing to do with the security of Signal encryption protocol, that continues to be one of the most secure encryption protocols. Recently an article published in April 2016 by security researcher Tobias Boelter has gained public attention:… read more »
  • Should I suggest to my friends to stop using all messaging apps, except Signal?

    In simple words: yes, if you care about privacy About the privacy implications related to the various instant messaging clients I have already wrote a few months ago in a rather terse. But this article by Romain Aubert instead treats the… read more »
  • How to secure MongoDB instances to avoid ransom attacks

    “MongoDB apocalypse is here as Ransom Attacks” Recently, some attackers have performed a lot malicious attacks on unsecured instances of MongoDB running openly on the internet. The attacker erased the database and demanded a ransom be paid before restoring it. Cyberciti has… read more »
  • What we know about EyePyramid?

    A useful recap by Federico Maggi The security researcher Federico Maggi has made a useful recap of all technical information currently available about EyePyramid, the malware used in the cyber-espionage campaign that involved some relevant Italian politicians. What happened? Sensitive information… read more »