-
Aug 2, 2019
Some months ago, Speigel Online reported on comments by Germany’s Interior Minister Horst Seehofer, who proposed greater governmental access to end-to-end encrypted communications, such as those by WhatsApp and Telegram. Seehofer proposing greater governmental access to end-to-end encrypted communications, such as those… read more »
-
Aug 1, 2019
Memory analysis on Windows 10 is pretty different from previous Windows versions: a new feature, called Memory Compression, make it necessary a forensic tool able to read compressed memory pages. Windows 10 memory compression Recent releases of Windows 10 include… read more »
-
Jul 31, 2019
Cybersecurity firm Immunity Inc. decided to sell a BlueKeep exploit module capable of full remote code execution as part of its penetration testing toolkit. https://vimeo.com/349688256/aecbf5cac5 https://twitter.com/Immunityinc/status/1153752470130221057 Concerns about malicious usage of this module spreds around the whole cybersecurity community: According… read more »
-
Jul 29, 2019
I'm going on vacation and get offline for a few days to recharge my batteries.
During this time, blog updates will be pretty sporadic.
See you soon!
… read more »
-
Jul 28, 2019
Last weekly roundup before my vacation: my last respect to an iconic actor, some privacy troubles for Apple Siri and a new interesting production from Hulu. INBOX Regarding GDPR CLI (a command line tool for checking websites GDPR compliancy), Lucy… read more »
-
Jul 27, 2019
This vulnerability, discovered by Nils Emmerich, resides in LibreLogo, a programmable turtle vector graphics script that ships by default with LibreOffice, and still exists in the latest version has been patched in version 6.2.5. LibreLogo allows users to specify pre-installed… read more »
-
Jul 26, 2019
Recently, GitLab performed a survey on over 4,000 developers and operators, with interesting results. This year, over 4,000 respondents – across various industries, roles, and geographic locations – candidly shared their experiences, helping us uncover what software professionals require in… read more »
-
Jul 25, 2019
A couple of very brief tip, useful during a forensic acquisition. During the initial phase of a digital forensic investigation, a lot of information about target systems need to be collected. One of this item are the information about the… read more »