• COVID-19: some concerns about Contact Tracing apps

    The Electronic Frontier Foundation, one of the most respected associations for the protection of privacy and digital rights, that fights since its beginnings against abuses of digital technologies, has published a large article that takes stock of anti-pandemic tracking apps,… read more »
  • Weekly Cybersecurity Roundup #5

    A lot of interesting links, this week: Ransonmware, new APT grops, new vulnerabilities and (as usual) some coronavirus-related news! TEMPEST@Home - Finding Radio Frequency Side Channels Have you ever listened to a photocopier or a car engine to infer what… read more »
  • Weekly Tech Roundup #4

    "I do not fear computers. I fear lack of them."— Isaac Asimov Cloudflare Workers Now Support COBOL Recently, COBOL has been in the news as the State of New Jersey has asked for help with a COBOL-based system for unemployment claims. The system… read more »
  • New iOS zero-days allows unassisted attacks via Mail.app

    Cybersecurity startup ZecOps discovered two zero-day vulnerabilities affecting iPhone and iPad devices during the analysis of a series of ongoing remote attacks that have targeted iOS users since at least January 2018. Following a routine iOS Digital Forensics and Incident… read more »
  • Weekly Privacy Roundup #4

    D'oh! A lot of dataleaks! Telsy’s report on UniCredit’s data breach went viral worldwide On the evening of April 19, Telsy denounced that the personal data of about 3000 employees of the UniCredit S.p.A. bank, one of the largest banks… read more »
  • Beware! A fully functional SMBGhost exploit will be coming soon!

    A proof-of-concept remote code execution exploit for the Windows 10 "SMBGhost" vulnerability (CVE-2020-0796) was developed and presented yesterday by Yuki Koike, a researcher by Ricerca Security. The vulnerability, that only impacts specific versions of Windows 10 and Windows Server, was… read more »
  • Weekly Cybersecurity Roundup #4

    As was the case in the past weeks, threat actors attempt to capitalize on coronavirus outbreak. System32 Comics Is BGP Safe Yet? No. But we are tracking it carefully BGP leaks and hijacks have been accepted as an unavoidable part… read more »
  • Weekly Tech Roundup #3

    This week NASA, MIT and…d'oh! COVID-19, again! Sandboxie's Source Code has been released Sophos, the company that acquired the Sandboxie sandboxing software and technology from Invincea in 2017, has released the source code of the application to the public. Sandboxie,… read more »
  • Weekly Privacy Roundup #3

    Here in your mind you have complete privacy. Here there's no difference between what is and what could be – Chuck Palahniuk EU Commission Recommends a Common Approach to Using Mobile Apps and Location Data to Combat and Exit COVID-19… read more »
  • A TikTok flaw could allows hijacking of contents, leaving users open to fake news

    The issue has been discovered by two developers, Talal Haj Bakry and Tommy Mysk. Developers have demonstrated how easy it is to trick TikTok into connecting to a fake server, exploiting app architecture, that uses HTTP instead of HTTPS to retrieve media… read more »
  • Privacy by Obfuscation

    In an interesting article on The MIT Press Reader, Finn Brunton & Helen Nissenbaum discuss how opting out of surveillance is practically useless, and suggests to use data obfuscation as a better alternative. I suggest to read the whole article,… read more »
  • Weekly Cybersecurity Roundup #3

    Happy (quarantined) Easter! Hackers accessed staff mailboxes at Italian bank Monte dei Paschi Italian state-owned bank Monte dei Paschi discloses a security breach, hackers have accessed the mailboxes of some employees and sent emails to clients. The news was reported… read more »
  • Weekly Tech Roundup #2

    Don't worry, 5G did not cause Coronavirus! https://twitter.com/Sandford_Police/status/1246125769539162113 How the 5G coronavirus conspiracy theory tore through the internet It started with one doctor. On January 22, Belgian newspaper Het Laatste Nieuws published an interview with Kris Van Kerckhoven, a general… read more »
  • i3: how to make a pretty lock screen with a small bash script

    My regular readers already knows that my favorite desktop environment on Linux is i3.However, let's face it, the UI of the default theme of lockscreen tool (i3lock) is hawful. Luckily, i3lock provides some command line options, such us the -i… read more »
  • Weekly Privacy Roundup #2

    Privacy is implied. Privacy is not up for discussion - Mikko Hypponen Twitter warns users – Firefox might hold on to private messages A bit of a brouhaha erupted at the end of last week – it wasn’t quite an… read more »
  • Security analysis of WhatsApp calls

    Some weeks ago, i've published a post about a research on Telegram Messenger by HackerFactor.The post got a lot of visit, so today i'd like to share a similar analysis, this time focused on WhatsApp calls. The analysis [1], made… read more »
  • Weekly Cybersecurity Roundup #2

    Remote work, 5th week! Microsoft: Emotet Took Down a Network by Overheating All Computers Microsoft says that an Emotet infection was able to take down an organization's entire network by maxing out CPUs on Windows devices and bringing its Internet… read more »
  • Weekly Tech Roundup #1

    It's Friday! Let's talk about Minecraft, Books, Space Movies AI and Robots! xkcd: Pathogen Resistance Automated decision-making systems and the fight against COVID-19 As the COVID-19 pandemic rages throughout the world, many are wondering whether and how to use automated… read more »
  • TLDR #3: Zero Trust Security

    Zero Trust Security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are within or outside of the network perimeter. “Zero trust”… read more »
  • Be careful! A Windows flaw lets Zoom leak network credentials and run code remotely

    Researcher have found a security issue in the Windows client of the popular video conferencing service that can be used for limited remote code execution and, worse, to capture and replay security tokens to access network resources. The app has… read more »