• The myths of VPNs

    Some days ago, a group of servers belonging to multiple VPN providers has been breached.After this events, many people have expressed doubts about the real usefulness of VPNs. In my opinion, VPNs are great privacy tools, but some providers tryes… read more »
  • My Weekly RoundUp #115

    Over the past seven days, i've read a lot of interesting news.So, today let's talk about the BerlusconiMarket shutdown, LulSecITA and FifthOfNovember, ransomware attack on a hospital, GoLang birthday, Apple vs. Electron, EA and VisualStudio, GraphQL, strange naming policies for… read more »
  • MESSAGETAP: Eavesdropping on SMS Messages inside Telco Networks

    FireEye reports on a Chinese-sponsored espionage campaign to eavesdrop on text messages, violating telco servers: yet another example that demonstrates why end-to-end message encryption is so important. A new malware, dubbed “Messagetap”, developed by the Chinese APT41 [2] hacker group… read more »
  • Some thoughts about WS-Discovery DDoS attacks

    Security researchers from Akamai published interesting details about the Web Services Dynamic Discovery (WS-Discovery) protocol, which they say can be abused to launch massive DDoS attacks. What is WS-Discovery? WS-Discovery is a multicast protocol that can be used on local networks… read more »
  • Light Commands: hacking voice assistants via laser beam

    Researchers from the University of Michigan and the University of Electro-Communications in Tokyo, demonstrated that is possible to hack smart voice assistants like Siri, Alexa and Google using a lasers beam to send them inaudible commands. This new technique, dubbed… read more »
  • A brand-new mass attack uses BlueKeep exploit to infect with Monero miners

    It was just a matter of time: the first "mass exploiting" of BlueKeep vulnerability is spotted in the wild.If you haven’t already patched your servers, do it asap! Last sunday, security researcher Kevin Beaumont posted a tweet about a large… read more »
  • My Weekly RoundUp #114

    A lot of links this week! Today let's talk about #KKNPP, #DKIM, #DFIR and #TimelineExplorer, #iPhone, #Whatsapp and #NSOGroup, #Powertool, #Protonmail, #Unicredit, #linustorvalds, #guidovanrossum and #python, #themandalorian and #bladerunner. Cybersecurity It's official, administrative network at Kudankulam Nuclear Power Plant was… read more »
  • CVE-2019-13720: new Chrome 0-day bug exploited in the wild

    Yesterday, Google engineers released an urgent update for the Chrome browser to patch an actively exploited zero-day. The release of Chrome 78.0.3904.87 fix two high severity vulnerabilities, one affecting Chrome's audio component (CVE-2019-13720) while the other resides in the PDFium… read more »
  • The warp drive is now a little less impossible

    How feasible are Warp Drives?A new theory opens the door to the possibility of creating a real warp drive (in the future!). The trick is to make space-time travelling around the ship and not the other way around, but the… read more »
  • CPDoS in a nutshell

    Recently, a team of cybersecurity researchers from Cologne University of Applied Sciences (Hoai Viet Nguyen and Luigi Lo Iacono) has disclosed a new cache poisoning attack against CDN systems that could be used to force a website into delivering error… read more »
  • Pwnagotchi: the open source gadget for WiFi pwning!

    Remember the Tamagotchi?Simone Margaritelli/Evilsocket created the Pwnagotchi, a mix between a game from the 90s and a wardriving tool, with a touch of machine learning. Pwnagotchi is a DIY, open source gadget running on a Raspberry Pi Zero W for… read more »
  • Happy 50th Birthday, Internet!

    On October 29, 1969, a first data packet was transmitted between two computers. It was the spark that started Internet. Although the birth of the world wide web itself is twenty years later, on March 12, 1989, when Tim Berners-Lee… read more »
  • My Weekly RoundUp #113

    Happy Birthday, Unix! Technology Celebrating 50 years of Unix https://www.youtube.com/watch?v=lz3GADLe__M We are commemorating Unix’s anniversary with the Unix50 event, a two-day celebration that will reflect on Unix’s past and explore the future of computing. Speakers and panelists include many of… read more »
  • The American army said goodbye to floppy disks.

    Some days ago I've published a post about retrogaming: today I'd like to talk about another piece of modern art, floppy disks! In these years, when most of us have switched to USB sticks, someone has never abandoned them: the… read more »
  • How to create a VirtualBox VM from command line

    A very appreciated feature of VirtualBox is the possibility to be used in a headless environment, without a GUI. So, today I want to share the workflow I use for creating virtual machines using only the command line. 1. Create… read more »
  • Servers belonging to multiple VPN providers has been breached: do VPN's gives a false feeling of security?

    I admit, the polemical title is just to get attention: VPNs are still useful! During the last weekend, security researcher hexdefined tweeted that NordVPN was compromised as the private keys for their web site certificate were publicly leaked on the… read more »
  • Internet Archive: a paradise for retrogamers!

    The Internet Archive is a nonprofit digital library that archives digital versions of computer games, books, audio recordings and videos. For vintage games lovers, Internet Archive has been preserving and adding games from the '70s, '80s and '90s on a… read more »
  • My Weekly RoundUp #112

    Last week in few keywords: OpenAI, SpaceX, DoH, Android, Firefox, Apple and Tencent, Microsoft, VLang, Onionshare and…Batman! Technology Solving Rubik’s Cube with a Robot Hand https://www.youtube.com/watch?v=kVmp0uGtShk We’ve trained a pair of neural networks to solve the Rubik’s Cube with a human-like… read more »
  • A NASA engineer says he has designed a space engine that may violate the laws of physics

    A spacecraft that would allow humans to reach every corner of the Universe? Currently is just a dream, even if what gives us hope today is the idea of David Burns, a NASA engineer who has proposed his concept of… read more »
  • Meet Graboid, the first cryptojacking worm that spreads using Docker images: how to defend your infrastructure from this new threat?

    Recently, researchers from Palo Alto Networks’ threat intelligence team Unit 42 have uncovered the first instance case of a cryptojacking worm that propagates via malicious Docker images. According with the report: Unit 42 researchers identified a new cryptojacking worm we’ve… read more »