• Achilles: over 400 vulnerabilities found on Qualcomm’s Snapdragon chip

    Check Point Research reported finding more than 400 bugs in the code used to control the Digital Signal Processing (DSP) cores in Qualcomm's Snapdragon chip families. According to Check Point's Slava Makkaveev, who spoke of this vulnerabilities at DEF CON [2], the flaws are… read more »
  • I'll see you in a couple of weeks!

    I really need a break, I will spend some days offline (I hope so!) https://www.youtube.com/watch?v=khyfYITIhV0 … read more »
  • Cybersecurity Roundup #15

    "Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch… read more »
  • Why Huawei USB stick setup on linux adds a strange "Huawei Autorun" script in system start?

    "Huawei installed malware on my Linux laptop"? Let's calm down and try to collect more information! Recently I've read an interesting article [1] published on "Sunburt Technology" blog: The screenshot above shows a script called "Huawei Autorun" which executes the… read more »
  • Weekly Tech Roundup #14

    "All of the books in the world contain no more information than is broadcast as video in a single large American city in a single year. Not all bits have equal value" - Carl Sagan Boot Up Windows 95 PC… read more »
  • "Change Of Season": four songs, entirely written by human

    I know: lately I'm often experimented AI-aided music composition, as well algorithmic generated melodies. However, meanwhile I continued writing my own music: I have the gift (or the curse, depending on your perspective) to have always some melodies swimming in… read more »
  • How secure and privacy-oriented is iOS?

    It’s a question that I’m often asked, from friends, colleagues and clients. The answer is not simple, in a nutshell: if you stay in the Apple ecosystem, security is guaranteed but you may lost control of your data privacy. In… read more »
  • Weekly Privacy Roundup #14

    "My inbox is the enemy" - Glenn Greenwald 'Unforgivable': The privacy breach that exposed sensitive details of WA's virus fight One of Western Australia's biggest privacy breaches, which involves the interception of thousands of State Government communications, is under investigation.… read more »
  • Vulnerable webapps and VMs for penetration testing practice: my own list

    A list that may be useful to readers that are studying for a certification exam or, more simply, to those who just want to have fun! Google Gruyere Gruyere is a Google project to teach web application exploitation and defense.… read more »
  • Weekly Cybersecurity Roundup #14

    "I am regularly asked what the average Internet user can do to ensure his security. My first answer is usually 'Nothing; you're screwed." - Bruce Scheneier Iranian cyberspies leave training videos exposed online One of Iran's top hacking groups (APT35)… read more »
  • Animal Kingdom: new experiments of computer aided composition

    In the past weeks, I've already written about some funny experiments that i made first with music and machine learning, then with music composed using pseudo-random algorithms. In both cases, results are some interesting, but strange, melodies that I finished… read more »
  • Sara Morrison: how SDKs, hidden trackers in your phone, work

    In a good article on Recode, Sara Morrison made a useful overview on trackers hidden in smartphone SDKs. Some highlights: Your phone is the ideal tool for advertisers and data brokers, both as a means of collecting your information and… read more »
  • Weekly Tech Roundup #13

    "Microsoft isn't evil, they just make really crappy operating systems." - Linus Torvalds Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam A number of high-profile Twitter accounts were simultaneously hacked on Wednesday by attackers who used… read more »
  • SIGRed: a 17-year-old wormable vulnerability in Windows DNS server

    Last Microsoft’s Patch Tuesday addressed a 17-year-old vulnerability impacting Microsoft Windows DNS Server, tracked as CVE-2020-1350 and dubbed "SigRed" by ChekPoint's researchers. The issue received a severity rating of 10.0 on the CVSS scale and affects Windows Server versions 2003… read more »
  • Will Cathcart: the future of digital communication and privacy

    The CEO of WhatsApp talking about the future of communication and privacy? Yes, in "virtual" TED-Talk! Will Cathcart is the Head of WhatsApp. He joined Facebook in 2010 and has worked on a number of Facebook’s products, becoming Vice President… read more »
  • Weekly Privacy Roundup #13

    "Privacy is not a luxury in America: it is a right - one that we need to defend in the digital realm as much as in the physical realm." - Chelsea Manning Maine Broadband Privacy Law Passes Early First Amendment… read more »
  • Using .lnk files as zero-touch downloaders

    In a good post on SANS ISC InfoSec Forum, Jan Kopriva shows how windows explorer shell links could be used by an attacker in order to download malicious payloads. Probably anyone who has used any modern version of Windows is… read more »
  • Weekly Cybersecurity Roundup #13

    “Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in… read more »
  • pySchö: algorithmic music composition

    In a previous post, I have talked about a python script used to generate random music starting from a single number (a "seed"). So, today I'd like to share with you pyScho. The name is a contraction of "Python" and… read more »
  • Weekly Tech Roundup #12

    "The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom" - Isaac Asimov Get more from Wikipedia — try reading about a subject in a different language For a broader take, consider looking… read more »