-
Jul 25, 2019
A couple of very brief tip, useful during a forensic acquisition. During the initial phase of a digital forensic investigation, a lot of information about target systems need to be collected. One of this item are the information about the… read more »
-
Jul 24, 2019
Yes, that's an uncomfortable topic! A team of researchers (Elena Maris, Timothy Libert and Jennifer Henrichsen) from Microsoft, the University of Pennsylvania, and Carnegie Mellon have revealed a study showing that Google and Facebook are keeping tabs on user's porn… read more »
-
Jul 23, 2019
QCSuper is a tool allowing to capture raw 2G/3G/4G radio frames, generating PCAP captures using Qualcomm-based phones and modems. Lately, I have been playing with a 3G dongle – a small USB device enabling to connect to the mobile Internet.… read more »
-
Jul 22, 2019
What happened last week? 50 years since the moon landing, 4 trailers from San Diego Comic-Con, 7.5 Terabytes of secret data and a proper recognition to the father of computer science! 50 years ago, NASA’s Apollo 11 mission changed our… read more »
-
Jul 21, 2019
Last weekend, on July 13, a group of hackers going by the name of 0v1ru$ hacked into Active Directory server of SyTech, a contractor for FSB, Russia's national intelligence service.From this server they gained access to the company's entire network,… read more »
-
Jul 19, 2019
Do you want to know the reason why? To "protect them from cyber threats"! Kazakhstan government has started intercepting all HTTPS internet traffic inside its borders, starting July 17. Governement instructed local ISPs to force their users into installing a… read more »
-
Jul 19, 2019
It's the killer app of the last weeks, but FaceApp has been giving people the power to change their facial expressions, looks, and now age, since 2017. But at the same time, people have been giving FaceApp the power to… read more »
-
Jul 18, 2019
This list of tools is really useful both in penetration testing on an Android application and in reverse engineering of a suspicious application.All tools are OSS and freely available: so, enjoy! Reverse Engineering APKInspector GUI tool for analysis of Android… read more »
-
Jul 17, 2019
Ok, it sounds like science fiction, but it's not.At its presentation at the California Academy of Sciences, Elon Musk‘s revealed that brain-computer interface company Neuralink its plans to begin human trials of its neuron-reading technology next year. The company has… read more »
-
Jul 17, 2019
Months ago, I published a post about Flare VM, a project by Fireeye/Mandiant researcher focused on the creation of a Windows-based security distribution for malware analysis. Recently, Fireeye released a similar project: another windows-based distribution, but this time dedicated to… read more »
-
Jul 16, 2019
UPDATE: Apple has sent out a silent security update to Macs to remove software that was automatically installed by RingCentral and Zhumu.(https://www.theverge.com/2019/7/16/20696529/apple-mac-silent-update-zoom-ringcentral-zhumu-vulnerabilty-patched) I've already written something about Zoom vulnerabilities (CVE-2019-13576, CVE-2019-13586) in my WeeklyRoundup, but today the security researcher Karan… read more »
-
Jul 16, 2019
The Great Hack covers the revelation that political consulting firm Cambridge Analytica secretly collected 87 million Facebook users’ data. The Great Hack starts with a light recap of the Cambridge Analytica scandal, enhanced with shimmering graphics that represent people’s data… read more »
-
Jul 15, 2019
According to a research published by Symantec, on Android systems attackers can manipulate media files transferred by users through the WhatsApp and Telegram messaging applications due to the way the Android operating system allows apps to access files in external… read more »
-
Jul 15, 2019
Last week several things caught my eye: cybersecurity news, interesting articles and new incoming TV shows.But first of all I want to talk about and interesting project: a videogame developed by a team of students as degree final project. Codename… read more »
-
Jul 14, 2019
Einstein described quantum mechanics as "spooky" because of the instantaneousness of the apparent remote interaction between two entangled particles.The interaction also seemed incompatible with elements of his special theory of relativity. The photo shows a strong form of quantum entanglement,… read more »
-
Jul 12, 2019
According to experts at ESET, the Windows zero-day vulnerability CVE-2019-1132 was exploited by the Buhtrap threat group in a targeted attack aimed at a government organization in Eastern Europe. TL;DR Keep your system up-to-date! The vulnerability The CVE-2019-1132 affects the… read more »
-
Jul 12, 2019
Malware researchers from Kaspersky have discovered new and improved versions of the FinFisher spyware, able o infect both Android and iOS devices. According to the experts, the new versions have been active at least since 2018, one of the samples… read more »
-
Jul 11, 2019
According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices. The malware doesn’t steal data from a user. Instead, it hacks apps and… read more »
-
Jul 11, 2019
Last saturday the Debian project has released the last version of the "universal operating system": the clean install, using updated CD images is one of the best and simple solution, however also the upgrade process is very simple and fast.… read more »
-
Jul 10, 2019
Offensive Security has released an official version of Kali Linux for Raspberry Pi 4, the last (and most powerful) version of the compact computer board, released just two weeks ago with a 1.5 GHz 64-bit quad-core ARM Cortex-A72 processor and 4GB… read more »