-
Nov 8, 2016
Two new approaches to track mobile devices which exploit authentication protocols that operate over WiFi In a presentation at BlackHat Europe, researchers Piers O’Hanlon and Ravishankar Borgaonkar from Oxford University have demonstrated a new type of IMSI catcher attack that… read more »
-
Nov 7, 2016
Create templates to use with VirtualBox to make vm detection harder Malware writers always try to detect if their creation is running on a VM. Malware has one huge advantage when executed on an automated VM analysis system: if the… read more »
-
Nov 4, 2016
These vulnerabilities could be exploited in shared hosting environments to gain access to all databases Some weeks ago i have reported about 2 critical 0Day vulnerabilities of MySQL (and his forks MariaDB e PerconaDB). At that time, the security researcher… read more »
-
Nov 3, 2016
It’s simple, with Stream2Chromecast! Are you searching for an easy way to stream media files from your LinuxBox to a Chromecast? You can use Stream2chromecast, a simple Python script that makes the task of streaming media files to a Chromecast… read more »
-
Nov 2, 2016
Cutting out the manual tasks in the first steps of memory analysis When you study new malware or wish to analyse suspicious executables you need to to extract the binary file and all the different injections and strings decrypted during the… read more »
-
Oct 30, 2016
Roland Dyens, the great composer and guitarist, dies at 61 Yesterday, on my Facebook stream, I see this news: https://www.facebook.com/parisguitarfoundation/photos/a.1430675880537182.1073741830.1429881190616651/1814149778856455/?type=3 “It will certainly be a hoax!”, I thought. But later the news was also confirmed by other sources: From his website:… read more »
-
Oct 28, 2016
Fingernails shape? A useful video lesson Matthew McAllister gives a lesson about the neverending story for classical guitarists: the shaping of fingernails. The video has published on the great YouTube channel of Siccas Guitars. Enjoy! [embed]https://www.youtube.com/watch?v=QT-_2Z3cN2k[/embed] About the teacher From Matthew’s official… read more »
-
Oct 27, 2016
A new attack technique that exploits the Rowhammer hardware vulnerability on Android devices Earlier last year, security researchers from Google’s Project Zero discovers Rowhammer, a hardware bug that allows attackers to manipulate data in memory without accessing it: by reading many… read more »