• "Elements": an experiment on algorithmic composition

    After some experiments with machine learning and music, I also tried algorithmic composition. According to Wikipedia [1], Algorithmic composition is the technique of using algorithms to create music. Algorithms (or, at the very least, formal sets of rules) have been… read more »
  • Wietze Beukema: almost 300 Windows 10 executables are vulnerable to DLL hijacking

    I've already written about DLL Hijacking, but today I'd like to share a really interesting research by Wietze Beukema. Researcher discovered that almost 300 Windows 10 executables are still vulnerable to DLL hijacking. The hijacking techniques covered by the Beukema's… read more »
  • Weekly Privacy Roundup #12

    "I would rather be without a state than without a voice" - Edward Snowden TikTok seems to be copying and pasting your clipboard with every keystroke A new privacy feature in iOS 14 has revealed that TikTok is copying the… read more »
  • James Duffy: Demystifying iOS Data Security

    I read an interesting article that I'd like to share with you today. A post on Elcomsoft blog by James Duffy, titled "Demystifying iOS Data Security". Recently I’ve been sent over a few questions from members of the community, such… read more »
  • Weekly Cybersecurity Roundup #12

    "One of the best ways to achieve justice is to expose injustice." - Julian Assange A zero-day guide for 2020: Recent attacks and advanced preventive techniques Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day… read more »
  • APT: Advanced Persistent Theme

    The title of this post got you curious? Did you thought that was an interesting analysis on APT groups?You wrong, it's really just self-promotion! Seriously, "Advanced Persistent Theme" is my new EP, focused on the "persistent musical themes" that swirling… read more »
  • Phantom of the ADAS: attacking driverless cars with projected characters

    Are driverless cars really safe for passenger and pedestrian?Take a look at this research! https://www.youtube.com/watch?v=1cSw4fXYqWI A really interesting research [1] by a team composed by academics and independent researchers (Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval… read more »
  • Weekly Tech Roundup #11

    Yep, this RoundUp has been monopolized by Apple's WWDC 2020 keynote! ARM Mac Impact On Intel Apple Macs are only a small part of the least profitable segment of Intel’s CPU business. On the Surface of things, nothing for Intel… read more »
  • My experiments with music and machine learning: A.I. (Art-typical Intelligence)

    Recently, I have become very interested in machine learning and A.I. in musical production. So, in the spare time, I started a machine learning project focused on music creation, using my own composition style.Using Magenta [1] (a python library based… read more »
  • Weekly Privacy Roundup #11

    "Transparency is for those who carry out public duties and exercise public power. Privacy is for everyone else." - Glenn Greenwald Niche Dating Apps Expose 100,000s of Users in Massive Data Breach Led by Noam Rotem and Ran Locar, vpnMentor’s research… read more »
  • Build your own "V4" Solenoid Engine

    Hackaday is a big issue for my productivity: sometimes I spend hours watching videos of people with extraordinary manual skills who builds beautiful things. My new obsession is the "Solenoid engine" built by Bryan Cockfield. Bryan Cockfield is an electrical… read more »
  • Weekly Cybersecurity Roundup #11

    "Companies spend millions of dollars on firewalls, encryption and secure access devices, and it's money wasted; none of these measures address the weakest link in the security chain." – Kevin Mitnick Build Your Own Botnet - Web App I made… read more »
  • LinuxCheck: Linux information gathering tool

    LinuxCheck is a small bash script for information collection, useful for emergency response on Debian and Centos systems. Features LinuxCheck [1] is a single script able to collect a large set of information: CPU TOP10, memory TOP10 CPU usage boot… read more »
  • Weekly Tech Roundup #10

    "The Internet is a telephone system that's gotten uppity." - Clifford Stoll Is Dark Mode Such A Good Idea? I’ve decided to stop using dark mode across all of my devices, because research suggests that going to the dark side… read more »
  • Bypass sites paywall WITHOUT addons? Is it possible?

    Yes, it is! With just a simple dot! It all began with a Reddit thread [1], in which visitors spoke about a strange bug in The New York Times paywall: Bypass the New York Times article paywall WITHOUT addons by… read more »
  • How to monitor battery healt and optimize power consumption on Windows 10 laptops without additional softwares

    Starting from Windows 8, Microsoft added a useful feature that allows users to monitor laptop battery health. To generate a Battery Report on Windows 10, simply follow this steps: Open a Command Prompt as administrator. To do that, press Windows Key + X… read more »
  • Weekly Privacy Roundup #10

    "I do agree that when it comes to cyber warfare, we have more to lose than any other nation on earth." - Edward Snowden IBM will no longer offer, develop, or research facial recognition technology IBM will no longer offer… read more »
  • Clive Thompson: The Secret History of Women in Coding

    From Ada Lovelace to the reVIVE's team, Clive Thompson traces the history of women in computer programming. In a great article for The New York Times, Clive Thompson retraces the history of women in computer science, starting from Ada Lovelace… read more »
  • Weekly Cybersecurity Roundup #10

    "The problem of viruses is temporary and will be solved in two years." – John McAfee, 1988 SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol Cybersecurity researchers today uncovered a new critical vulnerability affecting the Server Message Block (SMB)… read more »
  • Brave tries to clarify the "referral code" issue

    Yesterday I've talked about a strange behavior in Brave Browser, which adds referral codes in URLs when users try to open a "partnered" site. Few hours later the tweet [1] by Yannick Eckl , we have the answer from Brendan… read more »