• Weekly Tech Roundup #6

    "Computers are useless. They can only give you answers" - Pablo Picasso NASA still doesn’t know how long SpaceX’s astronaut mission will last We’re fast approaching crunch time for the partnership between NASA and SpaceX that will culminate in the… read more »
  • “Psychic Paper”: an amazingly simple iOS sandbox escape exploit

    Security researcher Siguza published a really interesting paper about a strange bug in iOS XML parsers, still unpatched, that allows sandbox escape. In his article [1], Siguza explains how to allow an app to gain full access to the entire… read more »
  • Some thoughts about detectability and feasibility of mobile eavesdropping on smartphones

    A research presented in 2019 by Jacob Leon Kröger and Philip Raschke, during the 33rd Annual IFIP WG 11.3 Conference, analyze technical and economical feasibility of eavesdropping on modern smartphones. The study’s findings [1] suggest that eavesdropping activity would not… read more »
  • Weekly Privacy Roundup #6

    "If someone steals your password, you can change it. But if someone steals your thumbprint, you can’t get a new thumb. The failure modes are very different." – Bruce Schneier  Is the GDPR failing? If it is, how can it… read more »
  • Practical approach to Golden Ticket Attacks: one technique, five useful tools

    In the past, I've already written about Kerberos attacks, especially on Ticket Attacks. In all examples, I've always used only Mimikatz, because i think is the most know tool used for this kind of attacks. However, some days ago, I… read more »
  • Weekly Cybersecurity Roundup #6

    "Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer." - Eric Raymond Hackers say they stole millions of credit cards from Banco BCR Hackers claim to have… read more »
  • Weekly Tech Roundup #5

    "The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency." - Bill Gates Coronavirus… read more »
  • iOS forensic acquisition methods

    Vladimir Katalov published, on ElcomSoft's blog, a good post about forensic acquisition techniques for iOS devices. It's a really interesting paper, from which I'd like to share some highlights: Logical acquisition Logical acquisition is the fastest, simplest, and most compatible… read more »