-
Dec 19, 2016
DNSChanger is back! DNSChanger is a malware that infected millions of computers across the world in 2012 and that works by changing DNS server entries in infected computers to point to malicious servers under the control of the attackers, rather than… read more »
-
Dec 19, 2016
Your site has been hacked? Be careful, it might contain a backdoor! BackdoorMan is a python script useful to discover malicious scripts in PHP sites: is quite common for attackers to place a back-door on a site they have violated… read more »
-
Dec 18, 2016
Free virtual machines, documentation and challenges! Exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering,… read more »
-
Dec 16, 2016
A really inspiring video A short video published by TheGuardian shows the morning routine of a legend of the ultramarathon, Scott Jurek: What ingredients are required to make an ultramarathon runner? In Boulder, Colorado, Scott Jurek has concocted quite the… read more »
-
Dec 15, 2016
On Android and iOS I found it on GitHub, a really useful list of tools and techniques to perform penetration tests on mobile applications: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on… read more »
-
Dec 14, 2016
“Some people asked me about how you can bypass all AV anti-viruses? My answer is: very simple.” Really interesting article by the security researcher Damon Mohammadbagher, about the techniques used by malware authors to bypass antivirus. In this post, Damon proposes… read more »
-
Dec 13, 2016
Christmas is coming, if you want to give me a gift, I give you a tip! Do you love role playing games, but also cybersecurity? Check this thread on reddit: Next week, I will be releasing the game Cryptomancer, designed by a… read more »
-
Dec 7, 2016
But be careful, can be dangerous! FPS Weapons has published a video tutorial that show how to build a 8$ handheld EMP generator which can be used to generate a strong enough magnetic pulse to induce an unexpected voltage inside… read more »
-
Dec 6, 2016
Free and DRM free! Increasingly we talk about privacy and global espionage and many people are worried about being caught under the ‘electronic surveillance’ carried by governments: the encryption is the only solution. Data and communications encryption allows to ensure an… read more »
-
Dec 5, 2016
You can find the answer in a Github repository We are not at the levels of the “Answer to the Ultimate Question of Life, the Universe, and Everything”, but we’re close. In this github repository i’ve found a really accurate… read more »
-
Dec 2, 2016
I had a very complicated work week…
… and I have no time (and desire) to write something serious.
So, i publish today just a funny strip by turnoff.us:
http://turnoff.us/geek/programmer-leves/
I’m between level 5 and 6, and you?
… read more »
-
Dec 1, 2016
There are two websites that can help you! Swedish developers Wille Dahlbo and Linus Unnebäck have created a website that can help you delete your online presence with just a few clicks. [embed]https://www.deseat.me/[/embed] Deseat.me lets you see all of the websites… read more »
-
Nov 30, 2016
A really dumb (but serious) Windows 10 vulnerability On Mikko Hypponen’s twitter account i’ve read this twit: [embed]https://twitter.com/mikko/status/803313343981350917[/embed] The linked article on Sami Laiho’s website exposes a vulnerability as simple as serious: if you hit SHIFT+F10 during Windows upgrade process… read more »
-
Nov 29, 2016
Useful to access quarantined files of Symantec and McAfee It can happen to have to analyze suspicious files on a compromised machine, but if the antivirus puts them in ‘in quarantine’ (usually encrypted in a specific directory), how recover them? Simple, with… read more »
-
Nov 28, 2016
Priceless data in case of attack! Properly make a copy of RAM of a Linux machine can be basic for forensic analysis against a cyberattack: as for the data to disk, even those in the memory may contain valuable information, and… read more »
-
Nov 25, 2016
Trivial, ironic, and perhaps even useful tips I’m not a lover of treadmill and indoor workouts, so in case of rain (even stronger) does not discourage me and grant me the daily morning run. So I propose 4 simple tips, earned… read more »
-
Nov 24, 2016
A good video by a young and talented musician I have never hidden my esteem for Tatyana Ryzhkova, so every time she publishes a new video on her Youtube channel i’m really happy to see it and review it. In this… read more »
-
Nov 23, 2016
The campaign spreads the Nemucod downloader If you receive any Facebook Message with an .SVG image file, just avoid clicking it: a malicious campaign is spreading a ransomware downloader (Nemucod) among Facebook users by taking advantage of innocent-looking SVG image file… read more »
-
Nov 22, 2016
Let’s do a recap on the situation and let’s see how to deal with migration Last year, security researchers has demonstrated that the cost of breaking the SHA-1 cryptographic hash function is lower than previously estimated (more technical info on… read more »
-
Nov 21, 2016
Be careful, next time that you leave your computer unattended at your office! Some time ago I spoke about a USB dongle that allows access to password-locked computers in a few seconds. Now the hardware hacker Samy Kamkar has released a… read more »