-
Nov 15, 2016
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker! Five well explained steps for install Kali Linux on a Raspberry Pi, mount a display and some other devices and obtain a fully functional portable hacking… read more »
-
Nov 14, 2016
A small tip by a great master On the eve of a concert or an exam is usual to be engaged in long exercise sessions, which can put a strain on our nails. The fingernails in fact tend to wear out… read more »
-
Nov 11, 2016
Twitter and LinkedIn iOS apps are vulnerable! The security researcher Collin Mulliner has discovered an exploitable vulnerability in Apple’s WebView that could allow phone calls to a number of the attacker’s choosing. iOS WebViews can be used to automatically call… read more »
-
Nov 10, 2016
With a Raspberry Pi and some other stuff A great article by Simone Margaritelli about the building of portable GSM BTS: a DIY version of commercial solutions like Stingray or Wintego CatchApp. In this blog post I’m going to explain… read more »
-
Nov 9, 2016
How to discover if your smartphone is under attack? Five tips by two security experts! In this interesting article by Darkreading Yair Amit (CTO and cofounder of mobile defense company Skycure) and Mike Murray (VP of security research and response for… read more »
-
Nov 8, 2016
Two new approaches to track mobile devices which exploit authentication protocols that operate over WiFi In a presentation at BlackHat Europe, researchers Piers O’Hanlon and Ravishankar Borgaonkar from Oxford University have demonstrated a new type of IMSI catcher attack that… read more »
-
Nov 7, 2016
Create templates to use with VirtualBox to make vm detection harder Malware writers always try to detect if their creation is running on a VM. Malware has one huge advantage when executed on an automated VM analysis system: if the… read more »
-
Nov 4, 2016
These vulnerabilities could be exploited in shared hosting environments to gain access to all databases Some weeks ago i have reported about 2 critical 0Day vulnerabilities of MySQL (and his forks MariaDB e PerconaDB). At that time, the security researcher… read more »