• Weekly Privacy Roundup #1

    Also in my privacy roundup the main topic this week is, again and unfortunately, the COVID-19 pandemic. Bluetooth tracking and COVID-19: A tech primer In a scramble to track, and thereby stem the flow of, new cases of Covid-19, Governments… read more »
  • Some security thoughts about videocalls

    Recently in Norway a school had to stop using the Whereby video conference service because during a video lesson a man broke into the group video conference and ​showed himself naked. This new phenomenon is called, according to Wikipedia, "Zoombombing":… read more »
  • Weekly Cybersecurity Roundup #1

    From today, i'll start to split the original "Weekly Roundup" in several small posts spread over the entire week.So, let's start with the "Weekly Cybersecurity Roundup"! Two zero days are Targeting DrayTek Broadband CPE Devices From December 4, 2019, 360Netlab… read more »
  • Amethyst: an 8-bit home computer based on ATmega1284

    Amethyst is a great project by Matt Sarnoff.It's like a classic home computer: it has an integrated keyboard and can generate audio and video and has a built-in high-level programming language for users to write their own programs. It uses… read more »
  • A brand-new attack hijack routers’ DNS to push malicious COVID-19 apps

    A recently discovered campaign that targets home and small-office routers is redirecting users to fake COVID-19 informational sites that attempt to install password stealing malware. A post published by security firm Bitdefender [1] said the attack is targetting Linksys routers,… read more »
  • Windows Service Accounts enumeration using Powershell

    Windows Service Accounts are the elephant in the room in the corporate environment: things that nobody ever talks about or considers to be a problem. Often, these service accounts are in the Domain Admins group, with passwords like "Service123", "Password123",… read more »
  • ADV200006: critical Windows RCE exploited in the wild

    Microsoft has released a security advisory about a remote code execution vulnerabilities affecting all currently supported versions of Windows and Windows Server operating systems. According to advisory [1], a remote attacker can exploit these vulnerabilities, affecting the Adobe Type Manager… read more »
  • My Weekly RoundUp #132

    Also last week, the main topic was Covid-19: Let's try to recap.Ah, I forgot: STAY. AT. HOME. http://www.commitstrip.com/en/2020/03/19/stay-at-home/ Technology Google’s coronavirus information site is now live Google has just launched a site with information and resources to understand the coronavirus… read more »
  • Pypykatz: a Mimikatz Python implementation

    Mimikatz is a famous post-exploitation tool written in C by Benjamin Delpy: it allows a local attacker to dump secrets from memory exploiting Windows single sign-on functionality. How Mimikatz works? Until Windows 10, Microsoft's OSs by default used a feature… read more »
  • Hacking Android Smart TVs using the IR remote control

    Valerio Mulas published an interesting analysis about the security of Android-based Smart TVs. The analysis points out the default configuration of most Android-based TVs, which allows you to enable the ADB, install unsigned applications and theoretically gain full control of… read more »
  • What do browsers say when they phone home?

    Professor Douglas Leith from Trinity College in Ireland, tested six web browsers to determine what data they were sharing. According to research [1], tested browsers splits into three distinct groups from this privacy perspective.In the first group, the most private, lies… read more »
  • Some thoughts about the Signal Messaging Protocol

    The Signal protocol is provides end-to-end encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among many others, serving well over 1 billion active users. Some years ago, a team of researchers (Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke… read more »
  • My Weekly RoundUp #131

    These are hard times but, everything will be fine! Italians are singing songs from their windows to boost morale during coronavirus lockdown https://twitter.com/Veritatisvis/status/1238552631548747777 Videos have been shared on social media of Italian citizens singing and dancing during a nationwide lockdown… read more »
  • How to block Windows 10 telemetry using "hosts" file

    Since Windows 8, Microsoft has moved to a new commercial strategy: in addition with traditional selling of OS licenses, started got revenues from searches, apps and games. But to do this, MS has started the collection of “telemetry” data, considered… read more »
  • SMBGhost (CVE-2020-0796): a new wormable Windows SMBv3 vulnerability

    Security firms inadvertently leaked info about a 0-Day 'wormable' vulnerability found in the SMBv3 protocol. UPDATE - 2020/03/13 Microsoft released the KB4551762 security update to patch the vulnerability: update ASAP! After the release of Patch Tuesday fixes, Fortinet [2] and Cisco Talos [3] published… read more »
  • Load Value Injection (CVE-2020-0551): a new Side-Channel attack affects Intel's CPUs

    Many processors made by Intel are vulnerable to a new type of attack named Load Value Injection. The vulnerability, tracked as CVE-2020-0551, was first reported to Intel in April 2019 by Jo Van Bulck from the KU Leuven research university… read more »
  • Security analysis of Telegram Messenger

    Do you need a secure and private messenger? You shouldn't be use Telegram! In the past, I've already written about security laks of major messenger systems [1]. So, today I'd like to share some interesting highlight from a post by… read more »
  • My Weekly RoundUp #130

    A lot has happened on last week, folks! But, first, don't panic! Don’t Panic: The comprehensive Ars Technica guide to the coronavirus More than 100,000 people have been infected with a new coronavirus that has spread widely from its origin… read more »
  • Cold Boot attack in Digital Forensics

    In 2008, a team of students and researchers from Princeton University, Wind River Systems and the Electronic Frontier Foundation published a research paper [3] examining the phenomena of computer memory remanence.That paper has confirmed what had long been theorized by… read more »
  • SurfingAttack: manipulating voice assistant devices with ultrasonic waves

    A research team has recently discovered a new attack method that enables remote users to interact with voice-controlled device using ultrasonic waves transmitted through (for example) the surface on which is placed the target device. The attack, dubbed "SurfingAttack" [1]… read more »