-
Dec 19, 2016
Your site has been hacked? Be careful, it might contain a backdoor! BackdoorMan is a python script useful to discover malicious scripts in PHP sites: is quite common for attackers to place a back-door on a site they have violated… read more »
-
Dec 18, 2016
Free virtual machines, documentation and challenges! Exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering,… read more »
-
Dec 16, 2016
A really inspiring video A short video published by TheGuardian shows the morning routine of a legend of the ultramarathon, Scott Jurek: What ingredients are required to make an ultramarathon runner? In Boulder, Colorado, Scott Jurek has concocted quite the… read more »
-
Dec 15, 2016
On Android and iOS I found it on GitHub, a really useful list of tools and techniques to perform penetration tests on mobile applications: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on… read more »
-
Dec 14, 2016
“Some people asked me about how you can bypass all AV anti-viruses? My answer is: very simple.” Really interesting article by the security researcher Damon Mohammadbagher, about the techniques used by malware authors to bypass antivirus. In this post, Damon proposes… read more »
-
Dec 13, 2016
Christmas is coming, if you want to give me a gift, I give you a tip! Do you love role playing games, but also cybersecurity? Check this thread on reddit: Next week, I will be releasing the game Cryptomancer, designed by a… read more »
-
Dec 7, 2016
But be careful, can be dangerous! FPS Weapons has published a video tutorial that show how to build a 8$ handheld EMP generator which can be used to generate a strong enough magnetic pulse to induce an unexpected voltage inside… read more »
-
Dec 6, 2016
Free and DRM free! Increasingly we talk about privacy and global espionage and many people are worried about being caught under the ‘electronic surveillance’ carried by governments: the encryption is the only solution. Data and communications encryption allows to ensure an… read more »
-
Dec 5, 2016
You can find the answer in a Github repository We are not at the levels of the “Answer to the Ultimate Question of Life, the Universe, and Everything”, but we’re close. In this github repository i’ve found a really accurate… read more »
-
Dec 2, 2016
I had a very complicated work week…
… and I have no time (and desire) to write something serious.
So, i publish today just a funny strip by turnoff.us:
http://turnoff.us/geek/programmer-leves/
I’m between level 5 and 6, and you?
… read more »
-
Dec 1, 2016
There are two websites that can help you! Swedish developers Wille Dahlbo and Linus Unnebäck have created a website that can help you delete your online presence with just a few clicks. [embed]https://www.deseat.me/[/embed] Deseat.me lets you see all of the websites… read more »
-
Nov 30, 2016
A really dumb (but serious) Windows 10 vulnerability On Mikko Hypponen’s twitter account i’ve read this twit: [embed]https://twitter.com/mikko/status/803313343981350917[/embed] The linked article on Sami Laiho’s website exposes a vulnerability as simple as serious: if you hit SHIFT+F10 during Windows upgrade process… read more »
-
Nov 29, 2016
Useful to access quarantined files of Symantec and McAfee It can happen to have to analyze suspicious files on a compromised machine, but if the antivirus puts them in ‘in quarantine’ (usually encrypted in a specific directory), how recover them? Simple, with… read more »
-
Nov 28, 2016
Priceless data in case of attack! Properly make a copy of RAM of a Linux machine can be basic for forensic analysis against a cyberattack: as for the data to disk, even those in the memory may contain valuable information, and… read more »
-
Nov 25, 2016
Trivial, ironic, and perhaps even useful tips I’m not a lover of treadmill and indoor workouts, so in case of rain (even stronger) does not discourage me and grant me the daily morning run. So I propose 4 simple tips, earned… read more »
-
Nov 24, 2016
A good video by a young and talented musician I have never hidden my esteem for Tatyana Ryzhkova, so every time she publishes a new video on her Youtube channel i’m really happy to see it and review it. In this… read more »
-
Nov 23, 2016
The campaign spreads the Nemucod downloader If you receive any Facebook Message with an .SVG image file, just avoid clicking it: a malicious campaign is spreading a ransomware downloader (Nemucod) among Facebook users by taking advantage of innocent-looking SVG image file… read more »
-
Nov 22, 2016
Let’s do a recap on the situation and let’s see how to deal with migration Last year, security researchers has demonstrated that the cost of breaking the SHA-1 cryptographic hash function is lower than previously estimated (more technical info on… read more »
-
Nov 21, 2016
Be careful, next time that you leave your computer unattended at your office! Some time ago I spoke about a USB dongle that allows access to password-locked computers in a few seconds. Now the hardware hacker Samy Kamkar has released a… read more »
-
Nov 18, 2016
The backdoor was discovered by Kryptowire According to the analysis made by security firm Kryptowire, some commercial firmware pre-installed on Android smartphone models sold in the US has been found to be secretly sending personal data to a third party… read more »