Andrea Fortuna
AboutRss
  • Jul 3, 2016

    Converse made a sneaker with a wah pedal built right in!

    With the Chuck Taylor All Stars, Converse is trying to create a new type of shoe that not only fits the rock and roll lifestyle, but actually helps to make it. The project derives by a prototype of 2013 made by… read more »
  • Jul 2, 2016

    Hacking of the Qualcomm Secure Execution Environment permit to break Android Full Disk Encryption

    Yes: if you have an Android smartphone with Qualcomm chipset FBI could be able to decrypt your device! “Bits, Please!” has published an article in which he explains how, with the complicity of a feature of QSEE (Qualcomm Secure Execution Environment)… read more »
  • Jul 1, 2016

    A lot of malicious apps on PlayStore can root and compromise your Android device

    By having multiple exploits to use, Godless can target virtually any Android device running on Android 5.1 (Lollipop) or earlier. The Google Play Store is full of malicious apps that has the ability to gain users’ attention into falling victim for… read more »
  • Jul 1, 2016

    How to get the best tone and sound projection? Some tips by William Kanengiser

    Let’s talk about fingernails shape and attack on the string A great video of William Kanengiser for Guitar Foundation of America on how to get the best tone and sound projection, in which well explains the principles of his right hand… read more »
  • Jun 30, 2016

    Zero-day ransomware targets Microsoft Office 365 Users

    Don’t rely on the security of Microsoft Office 365! A variant of Cerber Ransomware are now targeting Office 365 email users with a massive zero-day attack that has the ability to bypass its built-in security tools. Avanan, a cloud security provider,… read more »
  • Jun 30, 2016

    How will Brexit affect cybersecurity in the UK?

    What happens to security businesses in UK? http://www.ibtimes.co.uk/ has published a good article about ramification of Brexit on cybersecurity, with some interesting opinions of Brian Spector, CEO of Miracl, a cybersecurity firm based and operating in UK. Lack of tech talents “The… read more »
  • Jun 30, 2016

    Discover your foot type with the “Wet Test”

    Know your foot! Runnersworld.com published a simple method to discover if you have a foot with a flat or high arches, useful to choose the right pair of running shoes. The beautiful illustrations are realized by Dan Fuehrer: Pour a thin… read more »
  • Jun 29, 2016

    Multiple Parsing Vulnerabilities on Symantec Decomposer Engine: millions of users at risk!

    A lot of enterprise and home Symantec users are open to remote code execution vulnerabilities reported by Google’s Project Zero. These vulnerabilities don’t require any user interaction on a software that runs at the highest privilege levels possible: in certain cases… read more »
  • Jun 29, 2016

    Opportunity sends us a panoramic photo of ‘Marathon Valley’ on Mars

    Marathon Valley, seen through the robotic eyes of Opportunity http://www.jpl.nasa.gov/spaceimages/details.php?id=PIA20749 http://www.jpl.nasa.gov/ has published a very high resolution (17.000x6000 pixels) image of Marathon Valley on Mars surface. The image is a merge of multiple pancam exposures taken during the period April… read more »
  • Jun 28, 2016

    Game of Thrones Season 6 finale — “The Winds of Winter”

    A great episode, a great season finale… …a great soundtrack! https://www.youtube.com/watch?v=MFK0yG8xG5I Ramin Djawadi From Wikipedia: Ramin Djawadi (Persian: رامین جوادی‎‎; born July 19, 1974) is a German-Iranian composer. Djawadi is best known for his Grammy-nominated, guitar-heavy score for the 2008 Marvel… read more »
  • Jun 28, 2016

    The 10 golden rules from the NASA programmers

    How programmers write mission-critical code at NASA? To help them to write code clean, easy to understand and error-proof, NASA’s Jet Propulsion Laboratory has published a document with 10 rules for developing software, named “The Power of Ten–Rules for Developing Safety… read more »
  • Jun 27, 2016

    BGP Hijacking: current state and future developments

    The BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables. Autonomous Systems On the Internet any host, identified by its unique IP address, can talk to any other, anywhere in the world: this… read more »
  • Jun 26, 2016

    Editor war…

    Just for fun! https://www.facebook.com/nixcraft/photos/a.431194973560553.114666.126000117413375/1337662246247150/ From Wikipedia: Editor war is the common name for the rivalry between users of the Emacs and vi (Vim) text editors. The rivalry has become a lasting part of hacker culture and the free software community. Many… read more »
  • Jun 25, 2016

    Selfrando: a technique that secures Tor Browser against unmasking exploits

    TOR tries to resist to FBI attacks with a new project Apparently, the FBI seem capable to discover real address of the users of the Tor Network, and many experts are trying to win legal battles to force FBI to confess… read more »
  • Jun 24, 2016

    10 essential free online tools for Network tests and Malware analysis

    A short reasoned selection from my bookmarks RobTex DNSLookup, Domain informations,Network informations [embed]https://www.robtex.com/[/embed] Shodan Search engine used to find Internet of Things (IoT) connected devices around the world: reports open port and services. [embed]https://www.shodan.io/[/embed] Network-Tools.com Several online services, including domain… read more »
  • Jun 23, 2016

    A ransomware composed entirely of JavaScript?

    Security researcher Lawrence Abrams has noticed a new ransomware strain composed entirely of JavaScript. The ransomware, dubbed RAA, has been circulating through attachments masquerading as Word .doc files according to this post on Lawrence’s site BleepingComputer.com: RAA is currently being distributed… read more »
  • Jun 22, 2016

    Person Of Interest 5x13 — “Return 0”

    Endings are hard, but Person of Interest managed get its ending just right! #include <stdio.h>#include <limits.h> #define R INT_MAX int main(){ char myreview[R] = "The series finale delivered a satisfying ending to a great show that became so much more than… read more »
  • Jun 22, 2016

    Quantum Computers Explained

    Where are the limits of human technology? And can we somehow avoid them? This is where quantum computers become very interesting https://quantumfrontiers.com/2013/08/22/the-most-awesome-animation-about-quantum-computers-you-will-ever-see/ Entertaining and informative video about quantum computers, made by Kurzgesagt: In normal computers, bits are the smallest unit… read more »
  • Jun 21, 2016

    Let’s Encrypt and Certbot: simple and free HTTPS for every website

    But, it’s too simple? http://www.commitstrip.com/en/2016/06/13/the-end-of-an-expensive-era/ Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. The idea being that it’s high time more websites had a simple, easy to manage method to offer https encryption: The… read more »
  • Jun 20, 2016

    Game of Thrones S06E09 — “Battle of the Bastards”

    You’re going to die tomorrow, Lord Bolton. Sleep well. The budget for CGI spared during this season was spent all in this epic episode: excellent storyline, direction and editing almost cinematic. Highlights “My reign has just begun.” Daenerys and Yara: girl… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician