-
Dec 2, 2016
I had a very complicated work week…
… and I have no time (and desire) to write something serious.
So, i publish today just a funny strip by turnoff.us:
http://turnoff.us/geek/programmer-leves/
I’m between level 5 and 6, and you?
… read more »
-
Dec 1, 2016
There are two websites that can help you! Swedish developers Wille Dahlbo and Linus Unnebäck have created a website that can help you delete your online presence with just a few clicks. [embed]https://www.deseat.me/[/embed] Deseat.me lets you see all of the websites… read more »
-
Nov 30, 2016
A really dumb (but serious) Windows 10 vulnerability On Mikko Hypponen’s twitter account i’ve read this twit: [embed]https://twitter.com/mikko/status/803313343981350917[/embed] The linked article on Sami Laiho’s website exposes a vulnerability as simple as serious: if you hit SHIFT+F10 during Windows upgrade process… read more »
-
Nov 29, 2016
Useful to access quarantined files of Symantec and McAfee It can happen to have to analyze suspicious files on a compromised machine, but if the antivirus puts them in ‘in quarantine’ (usually encrypted in a specific directory), how recover them? Simple, with… read more »
-
Nov 28, 2016
Priceless data in case of attack! Properly make a copy of RAM of a Linux machine can be basic for forensic analysis against a cyberattack: as for the data to disk, even those in the memory may contain valuable information, and… read more »
-
Nov 25, 2016
Trivial, ironic, and perhaps even useful tips I’m not a lover of treadmill and indoor workouts, so in case of rain (even stronger) does not discourage me and grant me the daily morning run. So I propose 4 simple tips, earned… read more »
-
Nov 24, 2016
A good video by a young and talented musician I have never hidden my esteem for Tatyana Ryzhkova, so every time she publishes a new video on her Youtube channel i’m really happy to see it and review it. In this… read more »
-
Nov 23, 2016
The campaign spreads the Nemucod downloader If you receive any Facebook Message with an .SVG image file, just avoid clicking it: a malicious campaign is spreading a ransomware downloader (Nemucod) among Facebook users by taking advantage of innocent-looking SVG image file… read more »
-
Nov 22, 2016
Let’s do a recap on the situation and let’s see how to deal with migration Last year, security researchers has demonstrated that the cost of breaking the SHA-1 cryptographic hash function is lower than previously estimated (more technical info on… read more »
-
Nov 21, 2016
Be careful, next time that you leave your computer unattended at your office! Some time ago I spoke about a USB dongle that allows access to password-locked computers in a few seconds. Now the hardware hacker Samy Kamkar has released a… read more »
-
Nov 18, 2016
The backdoor was discovered by Kryptowire According to the analysis made by security firm Kryptowire, some commercial firmware pre-installed on Android smartphone models sold in the US has been found to be secretly sending personal data to a third party… read more »
-
Nov 17, 2016
A really dumb bug, but with a really simple fix! A vulnerability in Cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems. The security issue… read more »
-
Nov 16, 2016
Overload firewalls from a laptop (but also from a mobile phone!) When it comes to launching successful DDoS attacks, the equation is a simple: more traffic and more devices generating that traffic = more chance of knocking down a server. But recently… read more »
-
Nov 15, 2016
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker! Five well explained steps for install Kali Linux on a Raspberry Pi, mount a display and some other devices and obtain a fully functional portable hacking… read more »
-
Nov 14, 2016
A small tip by a great master On the eve of a concert or an exam is usual to be engaged in long exercise sessions, which can put a strain on our nails. The fingernails in fact tend to wear out… read more »
-
Nov 11, 2016
Twitter and LinkedIn iOS apps are vulnerable! The security researcher Collin Mulliner has discovered an exploitable vulnerability in Apple’s WebView that could allow phone calls to a number of the attacker’s choosing. iOS WebViews can be used to automatically call… read more »
-
Nov 10, 2016
With a Raspberry Pi and some other stuff A great article by Simone Margaritelli about the building of portable GSM BTS: a DIY version of commercial solutions like Stingray or Wintego CatchApp. In this blog post I’m going to explain… read more »
-
Nov 9, 2016
How to discover if your smartphone is under attack? Five tips by two security experts! In this interesting article by Darkreading Yair Amit (CTO and cofounder of mobile defense company Skycure) and Mike Murray (VP of security research and response for… read more »
-
Nov 8, 2016
Two new approaches to track mobile devices which exploit authentication protocols that operate over WiFi In a presentation at BlackHat Europe, researchers Piers O’Hanlon and Ravishankar Borgaonkar from Oxford University have demonstrated a new type of IMSI catcher attack that… read more »
-
Nov 7, 2016
Create templates to use with VirtualBox to make vm detection harder Malware writers always try to detect if their creation is running on a VM. Malware has one huge advantage when executed on an automated VM analysis system: if the… read more »