• Weekly Cybersecurity Roundup #13

    “Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in… read more »
  • pySchö: algorithmic music composition

    In a previous post, I have talked about a python script used to generate random music starting from a single number (a "seed"). So, today I'd like to share with you pyScho. The name is a contraction of "Python" and… read more »
  • Weekly Tech Roundup #12

    "The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom" - Isaac Asimov Get more from Wikipedia — try reading about a subject in a different language For a broader take, consider looking… read more »
  • "Elements": an experiment on algorithmic composition

    After some experiments with machine learning and music, I also tried algorithmic composition. According to Wikipedia [1], Algorithmic composition is the technique of using algorithms to create music. Algorithms (or, at the very least, formal sets of rules) have been… read more »
  • Wietze Beukema: almost 300 Windows 10 executables are vulnerable to DLL hijacking

    I've already written about DLL Hijacking, but today I'd like to share a really interesting research by Wietze Beukema. Researcher discovered that almost 300 Windows 10 executables are still vulnerable to DLL hijacking. The hijacking techniques covered by the Beukema's… read more »
  • Weekly Privacy Roundup #12

    "I would rather be without a state than without a voice" - Edward Snowden TikTok seems to be copying and pasting your clipboard with every keystroke A new privacy feature in iOS 14 has revealed that TikTok is copying the… read more »
  • James Duffy: Demystifying iOS Data Security

    I read an interesting article that I'd like to share with you today. A post on Elcomsoft blog by James Duffy, titled "Demystifying iOS Data Security". Recently I’ve been sent over a few questions from members of the community, such… read more »
  • Weekly Cybersecurity Roundup #12

    "One of the best ways to achieve justice is to expose injustice." - Julian Assange A zero-day guide for 2020: Recent attacks and advanced preventive techniques Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day… read more »