• Court forces e-mail provider Tutanota to release unencrypted messages

    The e-mail provider Tutanota advertises to be the "world's most secure e-mail service". The company offers encrypted e-mail communication and claims to have six million customers relying on this security promise. However, on October 2, 2018, the district court of… read more »
  • Facebook phishing attempt using image share notifications

    Just a short post to report an interesting phenomenon! Today i've been targeted by an unusual phishing attempt on my Facebook account: I've received a notification sayng that a account named Fəcebook Servıce 05 (pay attention to ə character) the… read more »
  • Vulnerabilities in 5G protocol may allows to track users and make fake emergency alerts

    Security researchers at Purdue University and the University of Iowa have found new vulnerabilities that can be used to track a victim’s real-time location, spoof emergency alerts or silently disconnect a phone from the 5G network. Despite some net neutrality… read more »
  • A glitch on Facebook App's UI reveals a weird camera activity

    UPDATE 2019/11/14: Facebook released version 247.0 that fixes the glitch. Joshua Maddux published on his Twitter account a video captured from an iPhone running iOS 13.2.2: in this video, a glitch in the interface of Facebook App reveals that the… read more »
  • The myths of VPNs

    Some days ago, a group of servers belonging to multiple VPN providers has been breached.After this events, many people have expressed doubts about the real usefulness of VPNs. In my opinion, VPNs are great privacy tools, but some providers tryes… read more »
  • My Weekly RoundUp #115

    Over the past seven days, i've read a lot of interesting news.So, today let's talk about the BerlusconiMarket shutdown, LulSecITA and FifthOfNovember, ransomware attack on a hospital, GoLang birthday, Apple vs. Electron, EA and VisualStudio, GraphQL, strange naming policies for… read more »
  • MESSAGETAP: Eavesdropping on SMS Messages inside Telco Networks

    FireEye reports on a Chinese-sponsored espionage campaign to eavesdrop on text messages, violating telco servers: yet another example that demonstrates why end-to-end message encryption is so important. A new malware, dubbed “Messagetap”, developed by the Chinese APT41 [2] hacker group… read more »
  • Some thoughts about WS-Discovery DDoS attacks

    Security researchers from Akamai published interesting details about the Web Services Dynamic Discovery (WS-Discovery) protocol, which they say can be abused to launch massive DDoS attacks. What is WS-Discovery? WS-Discovery is a multicast protocol that can be used on local networks… read more »
  • Light Commands: hacking voice assistants via laser beam

    Researchers from the University of Michigan and the University of Electro-Communications in Tokyo, demonstrated that is possible to hack smart voice assistants like Siri, Alexa and Google using a lasers beam to send them inaudible commands. This new technique, dubbed… read more »
  • A brand-new mass attack uses BlueKeep exploit to infect with Monero miners

    It was just a matter of time: the first "mass exploiting" of BlueKeep vulnerability is spotted in the wild.If you haven’t already patched your servers, do it asap! Last sunday, security researcher Kevin Beaumont posted a tweet about a large… read more »
  • My Weekly RoundUp #114

    A lot of links this week! Today let's talk about #KKNPP, #DKIM, #DFIR and #TimelineExplorer, #iPhone, #Whatsapp and #NSOGroup, #Powertool, #Protonmail, #Unicredit, #linustorvalds, #guidovanrossum and #python, #themandalorian and #bladerunner. Cybersecurity It's official, administrative network at Kudankulam Nuclear Power Plant was… read more »
  • CVE-2019-13720: new Chrome 0-day bug exploited in the wild

    Yesterday, Google engineers released an urgent update for the Chrome browser to patch an actively exploited zero-day. The release of Chrome 78.0.3904.87 fix two high severity vulnerabilities, one affecting Chrome's audio component (CVE-2019-13720) while the other resides in the PDFium… read more »
  • The warp drive is now a little less impossible

    How feasible are Warp Drives?A new theory opens the door to the possibility of creating a real warp drive (in the future!). The trick is to make space-time travelling around the ship and not the other way around, but the… read more »
  • CPDoS in a nutshell

    Recently, a team of cybersecurity researchers from Cologne University of Applied Sciences (Hoai Viet Nguyen and Luigi Lo Iacono) has disclosed a new cache poisoning attack against CDN systems that could be used to force a website into delivering error… read more »
  • Pwnagotchi: the open source gadget for WiFi pwning!

    Remember the Tamagotchi?Simone Margaritelli/Evilsocket created the Pwnagotchi, a mix between a game from the 90s and a wardriving tool, with a touch of machine learning. Pwnagotchi is a DIY, open source gadget running on a Raspberry Pi Zero W for… read more »
  • Happy 50th Birthday, Internet!

    On October 29, 1969, a first data packet was transmitted between two computers. It was the spark that started Internet. Although the birth of the world wide web itself is twenty years later, on March 12, 1989, when Tim Berners-Lee… read more »
  • My Weekly RoundUp #113

    Happy Birthday, Unix! Technology Celebrating 50 years of Unix https://www.youtube.com/watch?v=lz3GADLe__M We are commemorating Unix’s anniversary with the Unix50 event, a two-day celebration that will reflect on Unix’s past and explore the future of computing. Speakers and panelists include many of… read more »
  • The American army said goodbye to floppy disks.

    Some days ago I've published a post about retrogaming: today I'd like to talk about another piece of modern art, floppy disks! In these years, when most of us have switched to USB sticks, someone has never abandoned them: the… read more »
  • How to create a VirtualBox VM from command line

    A very appreciated feature of VirtualBox is the possibility to be used in a headless environment, without a GUI. So, today I want to share the workflow I use for creating virtual machines using only the command line. 1. Create… read more »
  • Servers belonging to multiple VPN providers has been breached: do VPN's gives a false feeling of security?

    I admit, the polemical title is just to get attention: VPNs are still useful! During the last weekend, security researcher hexdefined tweeted that NordVPN was compromised as the private keys for their web site certificate were publicly leaked on the… read more »