Andrea Fortuna
AboutRss
  • Oct 4, 2016

    Wintego launches a system called CatchApp that is able to spy WhatsApp encrypted communications

    Real product or marketing operation? The Israeli surveillance firm Wintego is offering for sale a system that is able to hack WhatsApp encrypted communications from mobile devices within close proximity of a hidden Wi-Fi hacking device in a backpack, intercepting… read more »
  • Oct 3, 2016

    JavaScript: the devil and the Holy water

    JavaScript is an awesome language? Or is horrible? Let’s talk about! An idea for reflection taken from an article published on CodeProject.com. Here a small resume, for the complete list refer to original article written by Dheeraj Kumar Kesri. The Good… read more »
  • Sep 30, 2016

    10 tips to secure your mobile phone, by MalwareBytes

    Some are useful, others a little trivial Recently i have read a useful article in MalwareBytes Blog, that shares 10 tips for securing mobile devices. Just last month, vulnerabilities in iOS 9.3.5 were being exploited by the notorious NSO Group, maker… read more »
  • Sep 29, 2016

    The rasgueado technique on guitar: a lesson by Pepe Romero

    A great lesson from a great teacher Rasgueado is a guitar finger strumming technique commonly associated with flamenco guitar music but also used in classical pieces. The rasgueado is executed using the fingers of right hand in rhythmically precise and rapid strumming… read more »
  • Sep 28, 2016

    BBQSQL, a framework for Blind SQL Injections

    Useful for penetration tests BBQSQL is a blind SQL injection framework written in Python, with also a semi-automatic tool, helpful for create customized SQL injection attacks in penetration testing activities. Blind SQL injection can be difficult to exploit. When the… read more »
  • Sep 27, 2016

    Privacy Obsessed? Clean up all EXIF data from your photos!

    A picture is worth a thousand words! Two Harvard students, Paul Lisker and Michael Rose, have unmasked 229 drug and weapon dealers with the help of EXIF data of pictures taken by criminals and used to advertise their product and services… read more »
  • Sep 26, 2016

    MQTT protocol, poor authentication and future threats

    A very interesting article by Marco Ramilli Marco Ramilli has published an interesting article, titled “Internet of Broken Things: Threats are changing, so are we?”, about possible threats on IoT devices based on MQTT protocol. Whats is MQTT? From Wikipedia: MQTT (formerly… read more »
  • Sep 23, 2016

    The last attack technique: malware through letterboxes!

    Unexpectedly received a USB stick in the post? Well… don’t plug it in! Police in the Australian state of Victoria are warning the citizen about a strange cybercriminal attack: randomly send unmarked USB sticks containing malware through letterboxes. The criminals hopes… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician