-
Aug 22, 2016
And shows how the National Security Agency was able to decrypt VPN traffic! Some days ago, an hackers group named “The Shadow Brokers” has announced to have hacked a group linked to the NSA and dumped a lot of its hacking… read more »
-
Aug 19, 2016
In this interesting video, the bielorussian guitar player Tatyana Ryzhkova talks about her fingernails shaping. [embed]https://www.youtube.com/watch?v=fDzFTBJRJnI[/embed] Tatyana uses a right hand posture rotated outwards, and this implies an asymmetric length of the fingernails, with the index fingernail visibly longer than… read more »
-
Aug 18, 2016
How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web! How make it? Three simple steps! 1 — Install Tor Install OrBot app from Google Play: [embed]https://play.google.com/store/apps/details?id=org.torproject.android[/embed] Then enable the ‘Hidden Service Hosting’ option… read more »
-
Aug 17, 2016
A group of researchers of Arizona State University think it could work! In the paper titled “Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence”, a group of 10 researchers ( Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra,… read more »
-
Aug 16, 2016
A cheat sheet of shortcuts and tips for analyzing and reverse-engineering malware Lenny Zeltser teaches digital forensics and anti-malware courses at SANS Institute: on his site, at https://zeltser.com/cheat-sheets/, has published a lot of useful cheat sheets. Today i want to… read more »
-
Aug 15, 2016
Pepe Romero talks about the Concierto de Aranjuez, The Universe, and Everything! From the youtube channel of the “Guitar Foundation of America” a useful video in which Pepe Romero talks about the “Concierto de Aranjuez”, by Joaquín Rodrigo. [embed]https://www.youtube.com/watch?v=4AYAf-tC8HI[/embed] Pepe… read more »
-
Aug 12, 2016
An end-to-end solution to incident responders and forensic analysts Rekall is a collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory samples. The extraction techniques are performed completely independent… read more »
-
Aug 11, 2016
It’s a trend topic, I think is useful summing up the highlights taken from the major sites. The malware has been active since at least 2011 and has been discovered on 30 infected organizations in Russia, Iran, Rwanda and possibly in… read more »
-
Aug 10, 2016
Recently we have heard many scary stories of hacking IoT devices, but how realistic is the threat? This is not just a hypothetical scenario: at the DEFCON24 security conference in Las Vegas, Ken Munro and Andrew Tierney of PenTestPartners have showed… read more »
-
Aug 9, 2016
Do we still need a CDN? PixelsCommander ha released an interesting project called ViralSJ: a Node.js/Express.js library to distribute application via P2P, using WebRTC. ViralJS creates a self-establishing and self-evolving CDN which moves data closer to client. P2P content distribution allows… read more »
-
Aug 8, 2016
Yep! Another vulnerability in Qualcomm devices, dubbed “QuadRooter”, was disclosed by Check Point in a session at DEF CON 24 in Las Vegas QuadRooter is a set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with… read more »
-
Aug 8, 2016
Need a simple smb scanner to search windows shares on a network? Here a very simple script, made with nmap, smbclient and some shell commands. Usage Obviously, the scanner uses the same syntax used by nmap: ./smbscanner 192.168.0.* Dependencies Just nmap… read more »
-
Aug 8, 2016
“It could work!” Some months ago, researchers at Stanford University have published a paper about a new technique, named “PowerSpy”, that has capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over… read more »
-
Aug 5, 2016
A new search engine, similar to Shodan.io but more hacker-friendly Censys is a search engine that was released in October by researchers from the University of Michigan as part of an open source project that aims at maintaining a “complete… read more »
-
Aug 5, 2016
A constantly updated list — Last update: August 2, 2018 During my daily activities of analysis and research, often I discover new useful tools. I collected them in this list (periodically updated). Enjoy! Detection AnalyzePE — Wrapper for a variety of tools for reporting on… read more »
-
Aug 4, 2016
Make your own nerd smartwatch from an old Nokia 1100 Using an old Nokia 1100, connecting it to an Arduino brain, and setting up the software, you’ll have a bulky, awful, but totally DIY smartwatch that can connect to your phone… read more »
-
Aug 3, 2016
Yes, science is also funny! What you see in the videos below is not exactly a scientific experiment.It’s more like a moment of relaxation, a fun time between the daily activities on International Space Station. The astronaut Terry Virts inserts an… read more »
-
Aug 2, 2016
The price? Quite cheap: only 3 Bitcoins (US$1,824) After data leaks of Linkedin and VK, peace_of_mind is back: it put for sale on the marketplace The Real Deal 200 million Yahoo logins. Peace says in the description that the database… read more »
-
Aug 2, 2016
Old but gold! Several years ago, when I was a young guitar student in the hills around Rome, I met many difficulties to be able to find, in the only music store in the country, this videotape. Once received, i inserted… read more »
-
Aug 1, 2016
Interesting project found on GitHub Cryptostalker and the original project randumb are the work of Sean Williams, who wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of… read more »