-
Nov 24, 2016
A good video by a young and talented musician I have never hidden my esteem for Tatyana Ryzhkova, so every time she publishes a new video on her Youtube channel i’m really happy to see it and review it. In this… read more »
-
Nov 23, 2016
The campaign spreads the Nemucod downloader If you receive any Facebook Message with an .SVG image file, just avoid clicking it: a malicious campaign is spreading a ransomware downloader (Nemucod) among Facebook users by taking advantage of innocent-looking SVG image file… read more »
-
Nov 22, 2016
Let’s do a recap on the situation and let’s see how to deal with migration Last year, security researchers has demonstrated that the cost of breaking the SHA-1 cryptographic hash function is lower than previously estimated (more technical info on… read more »
-
Nov 21, 2016
Be careful, next time that you leave your computer unattended at your office! Some time ago I spoke about a USB dongle that allows access to password-locked computers in a few seconds. Now the hardware hacker Samy Kamkar has released a… read more »
-
Nov 18, 2016
The backdoor was discovered by Kryptowire According to the analysis made by security firm Kryptowire, some commercial firmware pre-installed on Android smartphone models sold in the US has been found to be secretly sending personal data to a third party… read more »
-
Nov 17, 2016
A really dumb bug, but with a really simple fix! A vulnerability in Cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems. The security issue… read more »
-
Nov 16, 2016
Overload firewalls from a laptop (but also from a mobile phone!) When it comes to launching successful DDoS attacks, the equation is a simple: more traffic and more devices generating that traffic = more chance of knocking down a server. But recently… read more »
-
Nov 15, 2016
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker! Five well explained steps for install Kali Linux on a Raspberry Pi, mount a display and some other devices and obtain a fully functional portable hacking… read more »