Andrea Fortuna
AboutRss
  • May 18, 2016

    CVE-2016–1287: Cisco ASA Software IKEv1 / IKEv2 Buffer Overflow, proof of concept released

    Exodus Intelligence have released the proof of concept code on their GitHub page On February, 10 2016 a vulnerability related to the Internet Key Exchange (IKE) protocol implementation of Cisco devices (CVE-2016–1287) was ufficially released. Yesterday, the researchers who found this… read more »
  • May 18, 2016

    Check and Fix SD Card from the android terminal emulator

    Your Android SD card gets “corrupted” and you don’t have a PC to connect the smartphone and make the check of SD card? It’s possibile to make this operation directly from the smartphone? (rooted and with busybox installed, of course!)… read more »
  • May 17, 2016

    A Memory Access Violation in Symantec Antivirus Engine could crash your windows system

    Symantec’s Anti-Virus Engine was susceptible to memory access violation due to a kernel-level flaw when parsing a specifically-crafted PE header file. The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death… read more »
  • May 16, 2016

    Microsoft will double the number of Ads in the start menu of Windows 10?

    I just read this on The Verge: [embed]http://www.theverge.com/2016/5/16/11682164/microsoft-windows-10-promoted-apps-start-menu-anniversary-update[/embed] Seriously? Ads? But, what kind of Ads? Really, by reading the article it turns out that the “Ads” are just placeholders for applications that Microsoft ‘recommends’ for download, differentiated by country: Promoted apps… read more »
  • May 16, 2016

    SQL Injection in a Nutshell

    Ay Caramba! … read more »
  • May 16, 2016

    Crashing OSX and iOS apps with a simple PNG image

    Lander Brandt has discovered a denial of service vulnerability in ImageIO, a library of utilities for parsing various image formats. Which apps as affected? It’s used in many OS X and iOS applications including: Tweetbot Safari Messages Mail Preview Some… read more »
  • May 16, 2016

    Practical Malware Analysis, a complete starter kit

    Anyone who works in cybersecurity should read Practical Malware Analysis. Topics covered are the following: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and… read more »
  • May 14, 2016

    CVE-2016–4117: a new Adobe Flash 0-DAY in the wild

    Adobe has released a patch (APSB16–15) for a flash vulnerability (CVE-2016-4117) detected on May 8, 2016 by FireEye. FireEye has discovered an attack method based on embedding the Flash exploit inside a Microsoft Office document. The attacker hosts the MSOffice… read more »
  • May 12, 2016

    Fast de-obfuscation of javascript code

    In the last days, I had to examine the obfuscated JavaScript code inside of some malicious html pages. The original javascript code The obfuscation method is the classic ‘array-mapped’: you declare an array of functions and variable names that will… read more »
  • May 11, 2016

    Viking Horde: a new malware attacks Android devices

    A new type of malware is targeting Android devices via infected apps at the Google Play app store. The new threath was discovered by security firm Check Point: The Check Point research team uncovered a new Android malware campaign on… read more »
  • May 11, 2016

    WhatsApp releases desktop apps for windows and mac: the reactions from the major tech sites and…

    On Tuesday, WhatsApp launched its first-ever native desktop app, available on both Windows 8 and Mac OS 10.9 or above, as the company said in this blog post: [embed]https://blog.whatsapp.com/10000621/Introducing-WhatsApps-desktop-app[/embed] To download the app, visit https://www.whatsapp.com/download from your desktop browser. Then,… read more »
  • May 9, 2016

    ImageMagick bug puts countless websites at risk of hijacking

    From ImageMagick forum: We have recently received vulnerability reports for certain coders, they include possible remote code execution and ability to render files on the local system. These vulnerabilities will be addressed in versions 7.0.1–1 and 6.9.3–10, which are due… read more »
  • May 6, 2016

    My Weekly #Roundup #71 - #Slack #GameOfThrones #SteveVai #AndyMcKee

    Interesting things that i read in the last week! nn nnn nn Security & Privacy n nn n n Decryption Tool Stifles Jigsaw Ransomware Security n n n 3 Requirements for Effective Security Investigations Security n n n 5 Ways… read more »
  • May 2, 2016

    Yngwie J. Malmsteen, Black Star Intro: my transcription

    “Black Star” is the first track from Yngwie Malmsteen’s album Rising Force The Artist Yngwie Johan Malmsteen, born Lars Johan Yngve Lannerbäck on 30 June 1963, is a Swedish guitarist. He was heavily influenced by classical music, particularly 19th century… read more »
  • Apr 27, 2016

    Tor in a company network: how to detect and block it?

    TOR is an important tool. It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.… read more »
  • Apr 14, 2016

    The tremolo technique: how to improve it?

    The tremolo is a beautiful techniques of the classical guitar: it gives the impression of flow of notes, a continuous thread of sound. Basically it’s made playing a bass note with the thumb followed by three repeated higher notes, traditionally plucked… read more »
  • Mar 22, 2016

    Classical Guitar and fingernails: My2C

    In the world of classical guitar, the use of fingernails has become a standard. But as I have already discussed in a previous article, there are also excellent musicians who have chosen not to use fingernails. One above all is… read more »
  • Mar 15, 2016

    The Boije collection: over 1600 free works for classical guitar

    Carl Oscar Boije af Gennäs (1849–1923) was an insurance clerk and amateur guitarist. His collection includes nearly 1,000 works in print, together with hand written examples from the 19th century, including some original manuscripts by JK Mertz. This collection, which… read more »
  • Mar 10, 2016

    Over 1200 free guitar works from Danish Royal Library

    The Danish Royal Library is really a gold mine for classical guitar players. You will find on this site more than 1200 works by composers of the 19th century, known and less known. Here the list of PDFs (some links… read more »
  • Mar 8, 2016

    A440 or A432 tuning?

    Recently I have discussed with some friends about the tunings, and emerged a theory concerning the possibility of tune instruments using the A to 432 Hz instead of 440 Hz. So, i’ve started search some informations online, and i’ve found… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician