-
Jul 7, 2016
A new 0day vulnerability in Lenovo firmware that allows arbitrary SMM code execution on a wide range of Lenovo models Really interesting paper by Dmytro Oleksiuk, about his research on Lenovo Thinkpad Firmware: In this article I will continue to publish… read more »
-
Jul 6, 2016
Starts the workout before your brain figures out what you’re doing! Usually, I put running first on my agenda, to avoid some overlapping with any other activities related to work, family or social obligations. Furthermore, running early in the morning give… read more »
-
Jul 6, 2016
Spoiler Alert: it’s Signal! The Intercept and Gizmodo have published a comparison of the major messaging apps , focusing in particular on issues of privacy and security. I try to summarize them both. WhatsApp Facebook, owner of WhatsApp, can not read the… read more »
-
Jul 5, 2016
A new DDoS attack powered entirely by compromised CCTV units Security researchers of Sucuri have revealed a unique new DDoS attack launched against a small business, which was powered entirely by thousands of compromised CCTV units. 25,513 IP addresses were spotted,… read more »
-
Jul 5, 2016
What can you do with a programming language with only eight commands and a pointer? Brainfuck is an esoteric programming language created in 1993 by Urban Müller. It is fully Turing-complete, so it is not intended for practical use, but as… read more »
-
Jul 4, 2016
Aaron Thompson published his misadventure on Reddit On June 26 last year Aaron Thompson realized that he could no longer access your Facebook account: the email address and the phone numbers associated with the account had been changed. In its mailbox… read more »
-
Jul 4, 2016
July 4 is my independence day…from the couch! Last year, i’ve published on my (old) blog this article: [embed]http://oldsite.andreafortuna.org/running/2015/07/04/369-workouts-in-365-days/[/embed] In this post i write about the accomplishment of a my personal challenge: running everyday for an whole year, and i closed… read more »
-
Jul 3, 2016
With the Chuck Taylor All Stars, Converse is trying to create a new type of shoe that not only fits the rock and roll lifestyle, but actually helps to make it. The project derives by a prototype of 2013 made by… read more »
-
Jul 2, 2016
Yes: if you have an Android smartphone with Qualcomm chipset FBI could be able to decrypt your device! “Bits, Please!” has published an article in which he explains how, with the complicity of a feature of QSEE (Qualcomm Secure Execution Environment)… read more »
-
Jul 1, 2016
By having multiple exploits to use, Godless can target virtually any Android device running on Android 5.1 (Lollipop) or earlier. The Google Play Store is full of malicious apps that has the ability to gain users’ attention into falling victim for… read more »
-
Jul 1, 2016
Let’s talk about fingernails shape and attack on the string A great video of William Kanengiser for Guitar Foundation of America on how to get the best tone and sound projection, in which well explains the principles of his right hand… read more »
-
Jun 30, 2016
Don’t rely on the security of Microsoft Office 365! A variant of Cerber Ransomware are now targeting Office 365 email users with a massive zero-day attack that has the ability to bypass its built-in security tools. Avanan, a cloud security provider,… read more »
-
Jun 30, 2016
What happens to security businesses in UK? http://www.ibtimes.co.uk/ has published a good article about ramification of Brexit on cybersecurity, with some interesting opinions of Brian Spector, CEO of Miracl, a cybersecurity firm based and operating in UK. Lack of tech talents “The… read more »
-
Jun 30, 2016
Know your foot! Runnersworld.com published a simple method to discover if you have a foot with a flat or high arches, useful to choose the right pair of running shoes. The beautiful illustrations are realized by Dan Fuehrer: Pour a thin… read more »
-
Jun 29, 2016
A lot of enterprise and home Symantec users are open to remote code execution vulnerabilities reported by Google’s Project Zero. These vulnerabilities don’t require any user interaction on a software that runs at the highest privilege levels possible: in certain cases… read more »
-
Jun 29, 2016
Marathon Valley, seen through the robotic eyes of Opportunity http://www.jpl.nasa.gov/spaceimages/details.php?id=PIA20749 http://www.jpl.nasa.gov/ has published a very high resolution (17.000x6000 pixels) image of Marathon Valley on Mars surface. The image is a merge of multiple pancam exposures taken during the period April… read more »
-
Jun 28, 2016
A great episode, a great season finale… …a great soundtrack! https://www.youtube.com/watch?v=MFK0yG8xG5I Ramin Djawadi From Wikipedia: Ramin Djawadi (Persian: رامین جوادی; born July 19, 1974) is a German-Iranian composer. Djawadi is best known for his Grammy-nominated, guitar-heavy score for the 2008 Marvel… read more »
-
Jun 28, 2016
How programmers write mission-critical code at NASA? To help them to write code clean, easy to understand and error-proof, NASA’s Jet Propulsion Laboratory has published a document with 10 rules for developing software, named “The Power of Ten–Rules for Developing Safety… read more »
-
Jun 27, 2016
The BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. Autonomous Systems On the Internet any host, identified by its unique IP address, can talk to any other, anywhere in the world: this… read more »
-
Jun 26, 2016
Just for fun! https://www.facebook.com/nixcraft/photos/a.431194973560553.114666.126000117413375/1337662246247150/ From Wikipedia: Editor war is the common name for the rivalry between users of the Emacs and vi (Vim) text editors. The rivalry has become a lasting part of hacker culture and the free software community. Many… read more »