Andrea Fortuna
AboutRss
  • Aug 2, 2016

    peace_of_mind is back again: now sells 200 Million Yahoo accounts!

    The price? Quite cheap: only 3 Bitcoins (US$1,824) After data leaks of Linkedin and VK, peace_of_mind is back: it put for sale on the marketplace The Real Deal 200 million Yahoo logins. Peace says in the description that the database… read more »
  • Aug 2, 2016

    Andrés Segovia — The Song Of The Guitar

    Old but gold! Several years ago, when I was a young guitar student in the hills around Rome, I met many difficulties to be able to find, in the only music store in the country, this videotape. Once received, i inserted… read more »
  • Aug 1, 2016

    Detect crypto ransomware in realtime with Cryptostalker

    Interesting project found on GitHub Cryptostalker and the original project randumb are the work of Sean Williams, who wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of… read more »
  • Jul 29, 2016

    LastPass hacked — can password managers be trusted?

    Just a few days ago Paolo Attivissimo has published this post in which he comments on an article by Sophos dedicated to password management apps: [embed]https://nakedsecurity.sophos.com/2016/07/19/why-you-should-use-a-password-manager/[/embed] Paolo concludes his post with this thought: Ultimo dubbio ricorrente: ci si può fidare… read more »
  • Jul 28, 2016

    Musician? Here some tips to remain motivated during daily practice!

    Stay motivated and avoid burnout! Useful article by Brent Vaartstra from LearnJazzStandards Blog: 4 things that can help you to stay motivated when you practice your instrument. Become goal oriented Setting goals and writing them down can be the difference between success… read more »
  • Jul 27, 2016

    Tech for Jihad: Dissecting Jihadists’ Digital Toolbox

    Flashpoint analysts reveal cyber tools used by islamic terrorists Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries. In a new… read more »
  • Jul 26, 2016

    Running for time or Running for distance, that is the question!

    It’s one of the biggest dilemma of every runner: is better run slow for a long distance or make a short workout focused on the speed? (Spoiler: for me neither of the two!) The human brain is able to manage the… read more »
  • Jul 22, 2016

    You can lose weight playing Pokémon Go?

    OmniCalculator.com has released a funny tool focused on the eggs you can receive at PokéStops, and how much weight you might lose when you hatching them. Start by entering your weight, decide which type of egg you want to hatch, and… read more »
  • Jul 21, 2016

    Your iPhone can be remotely compromised with a simple message

    Luckily, the vulnerability was already fixed by Apple Tyler Bohan, a security researcher from Cisco Talos, has discovered a critical bug in iOS, similar to Android Stagefright. [embed]http://blog.talosintel.com/2016/07/apple-image-rce.html[/embed] The vulnerability (CVE-2016–4631) resides in ImageIO, an API used to handle image data,… read more »
  • Jul 21, 2016

    How to prevent the huge CPU usage of gnome-keyring-daemon when starting Google Chrome

    Let’s try to mitigate an annoying behavior of Google Chrome on Linux If you using the (useful!) data synchronization feature of Google Chrome, you may encounter an unusual CPU usage from gnome-keyring-daemon process when the browser starts: the gnome-keyring-daemon eats all… read more »
  • Jul 20, 2016

    Automate IP and URL analysis with Automater

    Automater is a tool created to automate the OSINT analysis of IP addresses. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me,… read more »
  • Jul 19, 2016

    The Floppotron

    In 2011, Paweł Zadrożniak starts a strange research: making music with old floppy drives and other olds pc peripherals. The first attemps are very simple, first with one single drive: [embed]https://youtu.be/GTRqxfnnYUQ[/embed] then with two devices: [embed]https://youtu.be/yHJOz_y9rZE[/embed] How does it work? It’s… read more »
  • Jul 18, 2016

    Protect privacy while using Pokémon GO

    You like playing Pokémon GO? Good, but not forget your privacy! Since this is an augmented reality game, Pokémon GO requires your GPS location and a data connection (either WiFi or cellular data), so you can not expect your privacy to… read more »
  • Jul 18, 2016

    Useful penetration testing tools Cheat Sheet

    Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery SMB Enumeration Python Local Web Server… read more »
  • Jul 15, 2016

    Androguard : reverse engineering tool for Android applications

    “Always Ready Always There” Androguard is a great tool written in Python to analyse/reverse Android applications. Developed by Anthony Desnos and Geoffroy Gueguen, Androguard is released under Apache License 2.0 Features Map and manipulate DEX/ODEX/APK/AXML/ARSC format into full Python objects Diassemble/Decompilation/Modification… read more »
  • Jul 14, 2016

    Best Javascript exception handler ever!

    God bless Stack Overflow! A funny post that i read on the Facebook Group “2600 | The Hacker Quarterly”, an ‘all-purposes’ exception handler for JavaScript: It works! https://jsfiddle.net/thpv2pkk/ … read more »
  • Jul 12, 2016

    Download torrents from Kickass Torrents from command line with Katastrophe

    The power of command line! UPDATE: I am afraid that at this point is not very useful :-) [embed]http://thehackernews.com/2016/07/kickasstorrents-kat-cr.html[/embed] Katastrophe is a command line tool made in python for scraping Kickass torrents (kat.cr). It provides options to scrape top torrents in given… read more »
  • Jul 11, 2016

    OpenSSL Tips: how to generate a .pfx file from certificate and private key?

    Do you need a .pfx file? You have the single certificate (.cer/.pem/.crt) and the private key (.key), but you need a single .pfx file (a passworded container format that contains both public and private certificate pairs) to install it on IIS Webserver? The… read more »
  • Jul 8, 2016

    A brief overview of most common container formats for SSL certificates

    A quick note, perhaps more useful for me than for readers SSL certificates using a lot of different container formats. Let’s try to clear this up: .csr : A Certificate Signing Request. Some applications can generate these for submission to certificate-authorities.It includes… read more »
  • Jul 7, 2016

    Alirio Díaz, the most important venezuelan guitarist and composer, died at age 92

    Usually I do not let myself be carried away by the wave of commemorations on social networks when a famous person passes away, but this time I would make an exception. On the afternoon of Tuesday July 5th, Alirio Díaz… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician