Andrea Fortuna
AboutRss
  • Oct 10, 2016

    How much is difficult realize a malware ignored by antimalware solutions?

    Pretty simple, according to recent researches! A group of the researchers from the Iswatlab team at the University of Sannio demonstrated how is easy to create a mobile malware that eludes antivirus solutions. The research was conducted by Corrado Aaron… read more »
  • Oct 7, 2016

    A C64C has been working non-stop for over 25 years!

    Actually lasted longer than the company itself! An auto repair shop in Gdansk, Poland still uses a Commodore 64 to run its operations: a lesson to learn about consumerism! This image was posted on Commodore USA’s Facebook page, with this comment:… read more »
  • Oct 6, 2016

    How to convert a Parallels Disk Image with qemu-img for forensics analysis with Autopsy

    From HDS to RAW In a previous post i have explained how to convert a VMWare disk image (VMDK) into a RAW format useful for import into a forensics tool like Autopsy. The same method can be used to convert a… read more »
  • Oct 5, 2016

    Mimikatz: a swiss-army knife for Windows credential gathering

    Really useful for penetration testing purposes! If a program has been written in order to keep in memory some credentials in clear text, this can be a security risk. When you make a security assessment, it will be useful a… read more »
  • Oct 4, 2016

    Wintego launches a system called CatchApp that is able to spy WhatsApp encrypted communications

    Real product or marketing operation? The Israeli surveillance firm Wintego is offering for sale a system that is able to hack WhatsApp encrypted communications from mobile devices within close proximity of a hidden Wi-Fi hacking device in a backpack, intercepting… read more »
  • Oct 3, 2016

    JavaScript: the devil and the Holy water

    JavaScript is an awesome language? Or is horrible? Let’s talk about! An idea for reflection taken from an article published on CodeProject.com. Here a small resume, for the complete list refer to original article written by Dheeraj Kumar Kesri. The Good… read more »
  • Sep 30, 2016

    10 tips to secure your mobile phone, by MalwareBytes

    Some are useful, others a little trivial Recently i have read a useful article in MalwareBytes Blog, that shares 10 tips for securing mobile devices. Just last month, vulnerabilities in iOS 9.3.5 were being exploited by the notorious NSO Group, maker… read more »
  • Sep 29, 2016

    The rasgueado technique on guitar: a lesson by Pepe Romero

    A great lesson from a great teacher Rasgueado is a guitar finger strumming technique commonly associated with flamenco guitar music but also used in classical pieces. The rasgueado is executed using the fingers of right hand in rhythmically precise and rapid strumming… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician