Andrea Fortuna
AboutRss
  • Jul 11, 2019

    ‘Agent Smith’ malware has infected Android apps on 25 million devices

    According to security firm Check Point, a newly discovered Android malware that replaces portions of apps with its own code has infected more than 25 million devices. The malware doesn’t steal data from a user. Instead, it hacks apps and… read more »
  • Jul 11, 2019

    Debian 10 "buster", upgrade from Debian 9: the easy way

    Last saturday the Debian project has released the last version of the "universal operating system": the clean install, using updated CD images is one of the best and simple solution, however also the upgrade process is very simple and fast.… read more »
  • Jul 10, 2019

    Kali Linux is now available for Raspberry Pi 4!

    Offensive Security has released an official version of Kali Linux for Raspberry Pi 4, the last (and most powerful) version of the compact computer board, released just two weeks ago with a 1.5 GHz 64-bit quad-core ARM Cortex-A72 processor and 4GB… read more »
  • Jul 9, 2019

    Operation Soft Cell: threat actors are stealing years of call records from hacked telecommunication providers

    Security researchers from Cybereason have uncovered a massive espionage campaign involving the theft of call records from hacked cell network providers to conduct targeted surveillance on individuals of interest. The hackers have systematically broken in to more than 10 cell… read more »
  • Jul 9, 2019

    Backdoor found in Ruby strong_password library

    The developer Tute Costa found a backdoor in the Ruby library during regular security audits. The code was used to check the password strength of user-chosen passwords when the library was being used in a production environment: In production, the… read more »
  • Jul 8, 2019

    CVE-2019-13053: Logitech keyboards and mice vulnerable to cyber attacks

    There are security vulnerabilities in several Logitech keyboards, mice and wireless presenters that may allows an attacker to send keystrokes and infect the computer. https://www.youtube.com/watch?v=EksyCO0DzYs Many Logitech wireless input devices are vulnerable to wireless attacks and can pose a security… read more »
  • Jul 8, 2019

    My Weekly RoundUp #100

    Weekly Roundup Episode 100! A lot of major news! Debian 10 was released and Netflix will produce a new series based on Neil Gaiman's "Sandman".Finally, a famous cybersecurity expert is leaving a famous company, while chinese governement makes questionable uses… read more »
  • Jul 7, 2019

    Canonical’s GitHub Account has been compromised!

    Don't worry, Ubuntu source code was not impacted! On July 6, 2019, hackers have breached the GitHub account of Canonical Ltd., the organization behind the Ubuntu Linux distribution. The company immediately launched an investigation, the good news is that the… read more »
  • Jul 6, 2019

    Stranger Things opening theme arranged for Ukulele solo

    Last Thursday Netflix released the third season of Stranger Things: so I think it's right to share a simple ukulele arrangement of the opening theme. The opening theme was composed by Kyle Dixon and Michael Stein of the synth band… read more »
  • Jul 4, 2019

    How to convert a Windows SFS (Dynamic Disks) partition to regular partition for forensic analysis

    Yes, the answer is 42! :-) During analysis of a compromised Windows virtual machine, recently I've faced with a VmWare disk containing a SFS partition (id 42): # fdisk -l DISK1-flat.vmdk Disk DISK1-flat.vmdk: 200 GiB, 214748364800 bytes, 419430400 sectors Units:… read more »
  • Jul 1, 2019

    My Weekly RoundUp #99

    Big changes in Apple, and some issue for the NASA... Privacy It’s the middle of the night. Do you know who your iPhone is talking to? Apple says, “What happens on your iPhone stays on your iPhone.” Our privacy experiment… read more »
  • Jun 26, 2019

    Automount USB devices on Linux using UDEV and Systemd

    I've already talked about my GNU/Linux workstations: my setup is often minimal and without graphical facilities. However, some facilities can be replicated without graphical tools and with a very small footprint on the system. For example, on my setup i've… read more »
  • Jun 24, 2019

    My Weekly RoundUp #98

    What's the most important news? Facebook's Libra or Neon Genesis Evangelion on Netflix? Cybersecurity Malware sidesteps Google permissions policy with new 2FA bypass technique When Google restricted the use of SMS and Call Log permissions in Android apps in March… read more »
  • Jun 21, 2019

    "Spanish Romance", from "Jeux Interdits" soundtrack: my own fingerstyle ukulele rendition

    Jeux interdits, is a 1952 French war drama film directed by René Clément and based on François Boyer's novel. While not initially successful in France, the film was a hit elsewhere. It won the Golden Lion at the Venice Film… read more »
  • Jun 19, 2019

    Tor transparent proxy on Linux: a simple implementation

    The starting idea comes from a colleague that asked me: "Is it possibile routing all system traffic thougth TOR, using it as a sort of VPN?". Yes, It's possible, using a specific feature of Tor. Tor has support for transparent… read more »
  • Jun 17, 2019

    My Weekly RoundUp #97

    This week I want to launch a new section in my Weekly Roundup: "INBOX" will contain my answers to questions and suggestions from readers, which I receive frequently, also via email and social media. INBOX A new incident response tool… read more »
  • Jun 14, 2019

    "10 Must-Know Classical Pieces for Fingerstyle Ukulele": my new songbook is available on Amazon!

    Ten ukulele arrangements of famous classical pieces, with fingering and tabs. In the musical field, I was born as a classical guitarist and, after my academic studies, I dedicated myself to other instruments, including my beloved ukulele. So, classical music… read more »
  • Jun 12, 2019

    Windows Security Event Logs: my own cheatsheet

    During a forensic investigation, Windows Event Logs are the primary source of evidence.Windows Event Log analysis can help an investigator draw a timeline based on the logging information and the discovered artifacts, but a deep knowledge of events IDs is… read more »
  • Jun 10, 2019

    My Weekly RoundUp #96

    Another week, another BGP hijack… Privacy Disclosing Tor users' real IP address through 301 HTTP Redirect Cache Poisoning https://vimeo.com/339586722 This blog post describes a practical application of the ‘HTTP 301 Cache Poisoning” attack that can be used by a malicious… read more »
  • Jun 7, 2019

    Prelude from Bach's Cello Suite No. 1, BWV 1007: my own ukulele arrangement

    A great classic, often used in gigs and weddings. Johann Sebastian Bach wrote his Cello Suite no. 1 around 1720, though the work was not published until 1825.It is a work in seven movements, and the Prelude, mainly consisting of… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician