-
May 18, 2016
Exodus Intelligence have released the proof of concept code on their GitHub page On February, 10 2016 a vulnerability related to the Internet Key Exchange (IKE) protocol implementation of Cisco devices (CVE-2016–1287) was ufficially released. Yesterday, the researchers who found this… read more »
-
May 18, 2016
Your Android SD card gets “corrupted” and you don’t have a PC to connect the smartphone and make the check of SD card? It’s possibile to make this operation directly from the smartphone? (rooted and with busybox installed, of course!)… read more »
-
May 17, 2016
Symantec’s Anti-Virus Engine was susceptible to memory access violation due to a kernel-level flaw when parsing a specifically-crafted PE header file. The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death… read more »
-
May 16, 2016
I just read this on The Verge: [embed]http://www.theverge.com/2016/5/16/11682164/microsoft-windows-10-promoted-apps-start-menu-anniversary-update[/embed] Seriously? Ads? But, what kind of Ads? Really, by reading the article it turns out that the “Ads” are just placeholders for applications that Microsoft ‘recommends’ for download, differentiated by country: Promoted apps… read more »
-
May 16, 2016
Ay Caramba!
… read more »
-
May 16, 2016
Lander Brandt has discovered a denial of service vulnerability in ImageIO, a library of utilities for parsing various image formats. Which apps as affected? It’s used in many OS X and iOS applications including: Tweetbot Safari Messages Mail Preview Some… read more »
-
May 16, 2016
Anyone who works in cybersecurity should read Practical Malware Analysis. Topics covered are the following: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and… read more »
-
May 14, 2016
Adobe has released a patch (APSB16–15) for a flash vulnerability (CVE-2016-4117) detected on May 8, 2016 by FireEye. FireEye has discovered an attack method based on embedding the Flash exploit inside a Microsoft Office document. The attacker hosts the MSOffice… read more »
-
May 12, 2016
In the last days, I had to examine the obfuscated JavaScript code inside of some malicious html pages. The original javascript code The obfuscation method is the classic ‘array-mapped’: you declare an array of functions and variable names that will… read more »
-
May 11, 2016
A new type of malware is targeting Android devices via infected apps at the Google Play app store. The new threath was discovered by security firm Check Point: The Check Point research team uncovered a new Android malware campaign on… read more »
-
May 11, 2016
On Tuesday, WhatsApp launched its first-ever native desktop app, available on both Windows 8 and Mac OS 10.9 or above, as the company said in this blog post: [embed]https://blog.whatsapp.com/10000621/Introducing-WhatsApps-desktop-app[/embed] To download the app, visit https://www.whatsapp.com/download from your desktop browser. Then,… read more »
-
May 9, 2016
From ImageMagick forum: We have recently received vulnerability reports for certain coders, they include possible remote code execution and ability to render files on the local system. These vulnerabilities will be addressed in versions 7.0.1–1 and 6.9.3–10, which are due… read more »
-
May 6, 2016
Interesting things that i read in the last week! nn nnn nn Security & Privacy n nn n n Decryption Tool Stifles Jigsaw Ransomware Security n n n 3 Requirements for Effective Security Investigations Security n n n 5 Ways… read more »
-
May 2, 2016
“Black Star” is the first track from Yngwie Malmsteen’s album Rising Force The Artist Yngwie Johan Malmsteen, born Lars Johan Yngve Lannerbäck on 30 June 1963, is a Swedish guitarist. He was heavily influenced by classical music, particularly 19th century… read more »
-
Apr 27, 2016
TOR is an important tool. It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.… read more »
-
Apr 14, 2016
The tremolo is a beautiful techniques of the classical guitar: it gives the impression of flow of notes, a continuous thread of sound. Basically it’s made playing a bass note with the thumb followed by three repeated higher notes, traditionally plucked… read more »
-
Mar 22, 2016
In the world of classical guitar, the use of fingernails has become a standard. But as I have already discussed in a previous article, there are also excellent musicians who have chosen not to use fingernails. One above all is… read more »
-
Mar 15, 2016
Carl Oscar Boije af Gennäs (1849–1923) was an insurance clerk and amateur guitarist. His collection includes nearly 1,000 works in print, together with hand written examples from the 19th century, including some original manuscripts by JK Mertz. This collection, which… read more »
-
Mar 10, 2016
The Danish Royal Library is really a gold mine for classical guitar players. You will find on this site more than 1200 works by composers of the 19th century, known and less known. Here the list of PDFs (some links… read more »
-
Mar 8, 2016
Recently I have discussed with some friends about the tunings, and emerged a theory concerning the possibility of tune instruments using the A to 432 Hz instead of 440 Hz. So, i’ve started search some informations online, and i’ve found… read more »