-
Sep 3, 2018
What does blockchain technology have to do with cybersecurity? Blockchain technology seems to be a Columbus' egg: it may removes error and fraud, it can track ownership, managing identities and is resilient to cyber attacks. Let's take a look at… read more »
-
Aug 31, 2018
The (unconfirmed) story goes that Francisco Tárrega composed Lágrima in 1881, while performing in London. He was depressed and homesick, and he wrote a song describing his state. The piece Lagrima is a prelude that consists of two 8-bar sections (A,… read more »
-
Aug 27, 2018
After the first disclosure of CVEs related to speculative execution vulnerabilities (Meltdown and Spectre) on CPUs, a lot of researcher started to analyze the CPUs in order to find other vulerabilities and possible exploit techniques. Just some days ago a… read more »
-
Aug 24, 2018
Adelita is a mazurka written by Francisco Tárrega: along with Capricho Árabe and Recuerdos de la Alhambra, it is one of his best-known works. The tempo notated by Tárrega was "Lento", however mazurkas are usually played faster. So, it is… read more »
-
Aug 20, 2018
In my previous post "Code injection on Windows using Python: a simple example", i've explored the ctype python library and the usage of Windows API in order to perform a code injection on 32bit systems. All tests was performed… read more »
-
Aug 13, 2018
How quantum physics can make encryption stronger Currently Vikram Sharma is the CEO (and founder) of QuintessenceLabs (or Q-Labs) which uses quantum technology to strengthen cryptographic key management and recently released a quantum random number generator stuffed into a PCI… read more »
-
Aug 6, 2018
Recently i had to perform some comparative tests on a couple of whitelisting solutions. One of the crucial step of the test was the proper functioning of memory monitoring feature, useful in case of process injection: infact, when a trusted… read more »
-
Aug 1, 2018
The Netflix Security Intelligence and Response Team (SIRT) has released (under Apache 2.0 license) a triage tool to help digital forensics and incident response teams quickly identify compromised hosts on which to focus their response. The tool, written in python… read more »