• Weekly Cybersecurity Roundup #3

    Happy (quarantined) Easter! Hackers accessed staff mailboxes at Italian bank Monte dei Paschi Italian state-owned bank Monte dei Paschi discloses a security breach, hackers have accessed the mailboxes of some employees and sent emails to clients. The news was reported… read more »
  • Weekly Tech Roundup #2

    Don't worry, 5G did not cause Coronavirus! https://twitter.com/Sandford_Police/status/1246125769539162113 How the 5G coronavirus conspiracy theory tore through the internet It started with one doctor. On January 22, Belgian newspaper Het Laatste Nieuws published an interview with Kris Van Kerckhoven, a general… read more »
  • i3: how to make a pretty lock screen with a small bash script

    My regular readers already knows that my favorite desktop environment on Linux is i3.However, let's face it, the UI of the default theme of lockscreen tool (i3lock) is hawful. Luckily, i3lock provides some command line options, such us the -i… read more »
  • Weekly Privacy Roundup #2

    Privacy is implied. Privacy is not up for discussion - Mikko Hypponen Twitter warns users – Firefox might hold on to private messages A bit of a brouhaha erupted at the end of last week – it wasn’t quite an… read more »
  • Security analysis of WhatsApp calls

    Some weeks ago, i've published a post about a research on Telegram Messenger by HackerFactor.The post got a lot of visit, so today i'd like to share a similar analysis, this time focused on WhatsApp calls. The analysis [1], made… read more »
  • Weekly Cybersecurity Roundup #2

    Remote work, 5th week! Microsoft: Emotet Took Down a Network by Overheating All Computers Microsoft says that an Emotet infection was able to take down an organization's entire network by maxing out CPUs on Windows devices and bringing its Internet… read more »
  • Weekly Tech Roundup #1

    It's Friday! Let's talk about Minecraft, Books, Space Movies AI and Robots! xkcd: Pathogen Resistance Automated decision-making systems and the fight against COVID-19 As the COVID-19 pandemic rages throughout the world, many are wondering whether and how to use automated… read more »
  • TLDR #3: Zero Trust Security

    Zero Trust Security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are within or outside of the network perimeter. “Zero trust”… read more »
  • Be careful! A Windows flaw lets Zoom leak network credentials and run code remotely

    Researcher have found a security issue in the Windows client of the popular video conferencing service that can be used for limited remote code execution and, worse, to capture and replay security tokens to access network resources. The app has… read more »
  • Weekly Privacy Roundup #1

    Also in my privacy roundup the main topic this week is, again and unfortunately, the COVID-19 pandemic. Bluetooth tracking and COVID-19: A tech primer In a scramble to track, and thereby stem the flow of, new cases of Covid-19, Governments… read more »
  • Some security thoughts about videocalls

    Recently in Norway a school had to stop using the Whereby video conference service because during a video lesson a man broke into the group video conference and ​showed himself naked. This new phenomenon is called, according to Wikipedia, "Zoombombing":… read more »
  • Weekly Cybersecurity Roundup #1

    From today, i'll start to split the original "Weekly Roundup" in several small posts spread over the entire week.So, let's start with the "Weekly Cybersecurity Roundup"! Two zero days are Targeting DrayTek Broadband CPE Devices From December 4, 2019, 360Netlab… read more »
  • Amethyst: an 8-bit home computer based on ATmega1284

    Amethyst is a great project by Matt Sarnoff.It's like a classic home computer: it has an integrated keyboard and can generate audio and video and has a built-in high-level programming language for users to write their own programs. It uses… read more »
  • A brand-new attack hijack routers’ DNS to push malicious COVID-19 apps

    A recently discovered campaign that targets home and small-office routers is redirecting users to fake COVID-19 informational sites that attempt to install password stealing malware. A post published by security firm Bitdefender [1] said the attack is targetting Linksys routers,… read more »
  • Windows Service Accounts enumeration using Powershell

    Windows Service Accounts are the elephant in the room in the corporate environment: things that nobody ever talks about or considers to be a problem. Often, these service accounts are in the Domain Admins group, with passwords like "Service123", "Password123",… read more »
  • ADV200006: critical Windows RCE exploited in the wild

    Microsoft has released a security advisory about a remote code execution vulnerabilities affecting all currently supported versions of Windows and Windows Server operating systems. According to advisory [1], a remote attacker can exploit these vulnerabilities, affecting the Adobe Type Manager… read more »
  • My Weekly RoundUp #132

    Also last week, the main topic was Covid-19: Let's try to recap.Ah, I forgot: STAY. AT. HOME. http://www.commitstrip.com/en/2020/03/19/stay-at-home/ Technology Google’s coronavirus information site is now live Google has just launched a site with information and resources to understand the coronavirus… read more »
  • Pypykatz: a Mimikatz Python implementation

    Mimikatz is a famous post-exploitation tool written in C by Benjamin Delpy: it allows a local attacker to dump secrets from memory exploiting Windows single sign-on functionality. How Mimikatz works? Until Windows 10, Microsoft's OSs by default used a feature… read more »
  • Hacking Android Smart TVs using the IR remote control

    Valerio Mulas published an interesting analysis about the security of Android-based Smart TVs. The analysis points out the default configuration of most Android-based TVs, which allows you to enable the ADB, install unsigned applications and theoretically gain full control of… read more »
  • What do browsers say when they phone home?

    Professor Douglas Leith from Trinity College in Ireland, tested six web browsers to determine what data they were sharing. According to research [1], tested browsers splits into three distinct groups from this privacy perspective.In the first group, the most private, lies… read more »