-
Aug 16, 2016
A cheat sheet of shortcuts and tips for analyzing and reverse-engineering malware Lenny Zeltser teaches digital forensics and anti-malware courses at SANS Institute: on his site, at https://zeltser.com/cheat-sheets/, has published a lot of useful cheat sheets. Today i want to… read more »
-
Aug 15, 2016
Pepe Romero talks about the Concierto de Aranjuez, The Universe, and Everything! From the youtube channel of the “Guitar Foundation of America” a useful video in which Pepe Romero talks about the “Concierto de Aranjuez”, by Joaquín Rodrigo. [embed]https://www.youtube.com/watch?v=4AYAf-tC8HI[/embed] Pepe… read more »
-
Aug 12, 2016
An end-to-end solution to incident responders and forensic analysts Rekall is a collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory samples. The extraction techniques are performed completely independent… read more »
-
Aug 11, 2016
It’s a trend topic, I think is useful summing up the highlights taken from the major sites. The malware has been active since at least 2011 and has been discovered on 30 infected organizations in Russia, Iran, Rwanda and possibly in… read more »
-
Aug 10, 2016
Recently we have heard many scary stories of hacking IoT devices, but how realistic is the threat? This is not just a hypothetical scenario: at the DEFCON24 security conference in Las Vegas, Ken Munro and Andrew Tierney of PenTestPartners have showed… read more »
-
Aug 9, 2016
Do we still need a CDN? PixelsCommander ha released an interesting project called ViralSJ: a Node.js/Express.js library to distribute application via P2P, using WebRTC. ViralJS creates a self-establishing and self-evolving CDN which moves data closer to client. P2P content distribution allows… read more »
-
Aug 8, 2016
Yep! Another vulnerability in Qualcomm devices, dubbed “QuadRooter”, was disclosed by Check Point in a session at DEF CON 24 in Las Vegas QuadRooter is a set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with… read more »
-
Aug 8, 2016
Need a simple smb scanner to search windows shares on a network? Here a very simple script, made with nmap, smbclient and some shell commands. Usage Obviously, the scanner uses the same syntax used by nmap: ./smbscanner 192.168.0.* Dependencies Just nmap… read more »
-
Aug 8, 2016
“It could work!” Some months ago, researchers at Stanford University have published a paper about a new technique, named “PowerSpy”, that has capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over… read more »
-
Aug 5, 2016
A new search engine, similar to Shodan.io but more hacker-friendly Censys is a search engine that was released in October by researchers from the University of Michigan as part of an open source project that aims at maintaining a “complete… read more »
-
Aug 5, 2016
A constantly updated list — Last update: August 2, 2018 During my daily activities of analysis and research, often I discover new useful tools. I collected them in this list (periodically updated). Enjoy! Detection AnalyzePE — Wrapper for a variety of tools for reporting on… read more »
-
Aug 4, 2016
Make your own nerd smartwatch from an old Nokia 1100 Using an old Nokia 1100, connecting it to an Arduino brain, and setting up the software, you’ll have a bulky, awful, but totally DIY smartwatch that can connect to your phone… read more »
-
Aug 3, 2016
Yes, science is also funny! What you see in the videos below is not exactly a scientific experiment.It’s more like a moment of relaxation, a fun time between the daily activities on International Space Station. The astronaut Terry Virts inserts an… read more »
-
Aug 2, 2016
The price? Quite cheap: only 3 Bitcoins (US$1,824) After data leaks of Linkedin and VK, peace_of_mind is back: it put for sale on the marketplace The Real Deal 200 million Yahoo logins. Peace says in the description that the database… read more »
-
Aug 2, 2016
Old but gold! Several years ago, when I was a young guitar student in the hills around Rome, I met many difficulties to be able to find, in the only music store in the country, this videotape. Once received, i inserted… read more »
-
Aug 1, 2016
Interesting project found on GitHub Cryptostalker and the original project randumb are the work of Sean Williams, who wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of… read more »
-
Jul 29, 2016
Just a few days ago Paolo Attivissimo has published this post in which he comments on an article by Sophos dedicated to password management apps: [embed]https://nakedsecurity.sophos.com/2016/07/19/why-you-should-use-a-password-manager/[/embed] Paolo concludes his post with this thought: Ultimo dubbio ricorrente: ci si può fidare… read more »
-
Jul 28, 2016
Stay motivated and avoid burnout! Useful article by Brent Vaartstra from LearnJazzStandards Blog: 4 things that can help you to stay motivated when you practice your instrument. Become goal oriented Setting goals and writing them down can be the difference between success… read more »
-
Jul 27, 2016
Flashpoint analysts reveal cyber tools used by islamic terrorists Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries. In a new… read more »
-
Jul 26, 2016
It’s one of the biggest dilemma of every runner: is better run slow for a long distance or make a short workout focused on the speed? (Spoiler: for me neither of the two!) The human brain is able to manage the… read more »