• You can lose weight playing Pokémon Go?

    OmniCalculator.com has released a funny tool focused on the eggs you can receive at PokéStops, and how much weight you might lose when you hatching them. Start by entering your weight, decide which type of egg you want to hatch, and… read more »
  • Your iPhone can be remotely compromised with a simple message

    Luckily, the vulnerability was already fixed by Apple Tyler Bohan, a security researcher from Cisco Talos, has discovered a critical bug in iOS, similar to Android Stagefright. [embed]http://blog.talosintel.com/2016/07/apple-image-rce.html[/embed] The vulnerability (CVE-2016–4631) resides in ImageIO, an API used to handle image data,… read more »
  • How to prevent the huge CPU usage of gnome-keyring-daemon when starting Google Chrome

    Let’s try to mitigate an annoying behavior of Google Chrome on Linux If you using the (useful!) data synchronization feature of Google Chrome, you may encounter an unusual CPU usage from gnome-keyring-daemon process when the browser starts: the gnome-keyring-daemon eats all… read more »
  • Automate IP and URL analysis with Automater

    Automater is a tool created to automate the OSINT analysis of IP addresses. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me,… read more »
  • The Floppotron

    In 2011, Paweł Zadrożniak starts a strange research: making music with old floppy drives and other olds pc peripherals. The first attemps are very simple, first with one single drive: [embed]https://youtu.be/GTRqxfnnYUQ[/embed] then with two devices: [embed]https://youtu.be/yHJOz_y9rZE[/embed] How does it work? It’s… read more »
  • Protect privacy while using Pokémon GO

    You like playing Pokémon GO? Good, but not forget your privacy! Since this is an augmented reality game, Pokémon GO requires your GPS location and a data connection (either WiFi or cellular data), so you can not expect your privacy to… read more »
  • Useful penetration testing tools Cheat Sheet

    Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery SMB Enumeration Python Local Web Server… read more »
  • Androguard : reverse engineering tool for Android applications

    “Always Ready Always There” Androguard is a great tool written in Python to analyse/reverse Android applications. Developed by Anthony Desnos and Geoffroy Gueguen, Androguard is released under Apache License 2.0 Features Map and manipulate DEX/ODEX/APK/AXML/ARSC format into full Python objects Diassemble/Decompilation/Modification… read more »
  • Best Javascript exception handler ever!

    God bless Stack Overflow! A funny post that i read on the Facebook Group “2600 | The Hacker Quarterly”, an ‘all-purposes’ exception handler for JavaScript: It works! https://jsfiddle.net/thpv2pkk/ … read more »
  • Download torrents from Kickass Torrents from command line with Katastrophe

    The power of command line! UPDATE: I am afraid that at this point is not very useful :-) [embed]http://thehackernews.com/2016/07/kickasstorrents-kat-cr.html[/embed] Katastrophe is a command line tool made in python for scraping Kickass torrents (kat.cr). It provides options to scrape top torrents in given… read more »
  • OpenSSL Tips: how to generate a .pfx file from certificate and private key?

    Do you need a .pfx file? You have the single certificate (.cer/.pem/.crt) and the private key (.key), but you need a single .pfx file (a passworded container format that contains both public and private certificate pairs) to install it on IIS Webserver? The… read more »
  • A brief overview of most common container formats for SSL certificates

    A quick note, perhaps more useful for me than for readers SSL certificates using a lot of different container formats. Let’s try to clear this up: .csr : A Certificate Signing Request. Some applications can generate these for submission to certificate-authorities.It includes… read more »
  • Alirio Díaz, the most important venezuelan guitarist and composer, died at age 92

    Usually I do not let myself be carried away by the wave of commemorations on social networks when a famous person passes away, but this time I would make an exception. On the afternoon of Tuesday July 5th, Alirio Díaz… read more »
  • Dmytro Oleksiuk: exploring and exploiting Lenovo firmware

    A new 0day vulnerability in Lenovo firmware that allows arbitrary SMM code execution on a wide range of Lenovo models Really interesting paper by Dmytro Oleksiuk, about his research on Lenovo Thinkpad Firmware: In this article I will continue to publish… read more »
  • Five tips to become a morning runner

    Starts the workout before your brain figures out what you’re doing! Usually, I put running first on my agenda, to avoid some overlapping with any other activities related to work, family or social obligations. Furthermore, running early in the morning give… read more »
  • Telegram, WhatsApp and Signal: which is the best for security and privacy?

    Spoiler Alert: it’s Signal! The Intercept and Gizmodo have published a comparison of the major messaging apps , focusing in particular on issues of privacy and security. I try to summarize them both. WhatsApp Facebook, owner of WhatsApp, can not read the… read more »
  • A DDoS Attack Powered by 25,000 CCTV Cameras

    A new DDoS attack powered entirely by compromised CCTV units Security researchers of Sucuri have revealed a unique new DDoS attack launched against a small business, which was powered entirely by thousands of compromised CCTV units. 25,513 IP addresses were spotted,… read more »
  • An introduction to Brainfuck programming

    What can you do with a programming language with only eight commands and a pointer? Brainfuck is an esoteric programming language created in 1993 by Urban Müller.  It is fully Turing-complete, so it is not intended for practical use, but as… read more »
  • How to steal a Facebook account without being a security expert

    Aaron Thompson published his misadventure on Reddit On June 26 last year Aaron Thompson realized that he could no longer access your Facebook account: the email address and the phone numbers associated with the account had been changed. In its mailbox… read more »
  • My Running Streak Challenge: the second year is done!

    July 4 is my independence day…from the couch! Last year, i’ve published on my (old) blog this article: [embed]http://oldsite.andreafortuna.org/running/2015/07/04/369-workouts-in-365-days/[/embed] In this post i write about the accomplishment of a my personal challenge: running everyday for an whole year, and i closed… read more »