-
Jul 21, 2020
"I am regularly asked what the average Internet user can do to ensure his security. My first answer is usually 'Nothing; you're screwed." - Bruce Scheneier Iranian cyberspies leave training videos exposed online One of Iran's top hacking groups (APT35)… read more »
-
Jul 20, 2020
In the past weeks, I've already written about some funny experiments that i made first with music and machine learning, then with music composed using pseudo-random algorithms. In both cases, results are some interesting, but strange, melodies that I finished… read more »
-
Jul 17, 2020
In a good article on Recode, Sara Morrison made a useful overview on trackers hidden in smartphone SDKs. Some highlights: Your phone is the ideal tool for advertisers and data brokers, both as a means of collecting your information and… read more »
-
Jul 16, 2020
"Microsoft isn't evil, they just make really crappy operating systems." - Linus Torvalds Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam A number of high-profile Twitter accounts were simultaneously hacked on Wednesday by attackers who used… read more »
-
Jul 15, 2020
Last Microsoft’s Patch Tuesday addressed a 17-year-old vulnerability impacting Microsoft Windows DNS Server, tracked as CVE-2020-1350 and dubbed "SigRed" by ChekPoint's researchers. The issue received a severity rating of 10.0 on the CVSS scale and affects Windows Server versions 2003… read more »
-
Jul 14, 2020
The CEO of WhatsApp talking about the future of communication and privacy? Yes, in "virtual" TED-Talk! Will Cathcart is the Head of WhatsApp. He joined Facebook in 2010 and has worked on a number of Facebook’s products, becoming Vice President… read more »
-
Jul 13, 2020
"Privacy is not a luxury in America: it is a right - one that we need to defend in the digital realm as much as in the physical realm." - Chelsea Manning Maine Broadband Privacy Law Passes Early First Amendment… read more »
-
Jul 10, 2020
In a good post on SANS ISC InfoSec Forum, Jan Kopriva shows how windows explorer shell links could be used by an attacker in order to download malicious payloads. Probably anyone who has used any modern version of Windows is… read more »
-
Jul 9, 2020
“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in… read more »
-
Jul 8, 2020
In a previous post, I have talked about a python script used to generate random music starting from a single number (a "seed"). So, today I'd like to share with you pyScho. The name is a contraction of "Python" and… read more »
-
Jul 7, 2020
"The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom" - Isaac Asimov Get more from Wikipedia — try reading about a subject in a different language For a broader take, consider looking… read more »
-
Jul 6, 2020
After some experiments with machine learning and music, I also tried algorithmic composition. According to Wikipedia [1], Algorithmic composition is the technique of using algorithms to create music. Algorithms (or, at the very least, formal sets of rules) have been… read more »
-
Jul 3, 2020
I've already written about DLL Hijacking, but today I'd like to share a really interesting research by Wietze Beukema. Researcher discovered that almost 300 Windows 10 executables are still vulnerable to DLL hijacking. The hijacking techniques covered by the Beukema's… read more »
-
Jul 2, 2020
"I would rather be without a state than without a voice" - Edward Snowden TikTok seems to be copying and pasting your clipboard with every keystroke A new privacy feature in iOS 14 has revealed that TikTok is copying the… read more »
-
Jul 1, 2020
I read an interesting article that I'd like to share with you today. A post on Elcomsoft blog by James Duffy, titled "Demystifying iOS Data Security". Recently I’ve been sent over a few questions from members of the community, such… read more »
-
Jun 30, 2020
"One of the best ways to achieve justice is to expose injustice." - Julian Assange A zero-day guide for 2020: Recent attacks and advanced preventive techniques Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day… read more »
-
Jun 29, 2020
The title of this post got you curious? Did you thought that was an interesting analysis on APT groups?You wrong, it's really just self-promotion! Seriously, "Advanced Persistent Theme" is my new EP, focused on the "persistent musical themes" that swirling… read more »
-
Jun 26, 2020
Are driverless cars really safe for passenger and pedestrian?Take a look at this research! https://www.youtube.com/watch?v=1cSw4fXYqWI A really interesting research [1] by a team composed by academics and independent researchers (Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval… read more »
-
Jun 25, 2020
Yep, this RoundUp has been monopolized by Apple's WWDC 2020 keynote! ARM Mac Impact On Intel Apple Macs are only a small part of the least profitable segment of Intel’s CPU business. On the Surface of things, nothing for Intel… read more »
-
Jun 24, 2020
Recently, I have become very interested in machine learning and A.I. in musical production. So, in the spare time, I started a machine learning project focused on music creation, using my own composition style.Using Magenta [1] (a python library based… read more »