Luciano Ferrari

t’s It’s Not Paranoia if Your Phone is Really Watching You

Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can’t even do that yet, at least not legally, but it is working on it. Remember: It’s not paranoia if they’re actually after you. James Jesus Angleton, former chief of the CIA’s counterintelligence staff, and science-fiction writer Philip K. Dick might at first seem […]

t’s It’s Not Paranoia if Your Phone is Really Watching You Read More »

iPhones On Almost 50 Carriers Are Vulnerable To Hackers Read more: http://www.itproportal.com/2012/05/24/iphones-almost-50-carriers-are-vulnerable-hackers/#ixzz1vrCSUzAq

Written by Radu Tyrsina Experts warn about security holes that might give unwanted access to your iPhone Security experts have warned that smartphones running on AT&T and at least 47 other carriers are vulnerable to hijacking. iPhones and Android devices are particular targets for malicious hackers, who can intercept information and phone calls as well

iPhones On Almost 50 Carriers Are Vulnerable To Hackers Read more: http://www.itproportal.com/2012/05/24/iphones-almost-50-carriers-are-vulnerable-hackers/#ixzz1vrCSUzAq Read More »

New ways to track you via your mobile devices: Big Brother or good business?

A new technology called IPS can track your every move — or help you find a departure gate at the airport. Should we fear it or embrace it? By Christina DesMarais | PC World Privacy fans, take note: A new technology, called Indoor Positioning System, could push your worry meter to the max. IPS allows pinpoint tracking

New ways to track you via your mobile devices: Big Brother or good business? Read More »

Flaw Found in Common Network Security Technology

  Network firewall “middlebox” technology could unwittingly help hackers hijack an Internet connection. Middleboxes monitor the “sequence numbers” of data packets being sent to mobile devices. Middleboxes could help hackers use the process of elimination to home in on a number in the right range, then gain access to passwords.  A popular technology used to

Flaw Found in Common Network Security Technology Read More »

Burp Suite 1: Introduction

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility. Burp Suite

Burp Suite 1: Introduction Read More »

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts

By Sanjeev Ramachandran If you think Google always tops in securing your data and personal information on web, that need not be always true. Now web security analysts feel that the password recovery options given in Gmail can be an easy way for hackers to get access to hundreds of Gmail accounts. Presently, one of the

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts Read More »

Uncover your Google search records with Google Takeout

This little known tool, which turns one this June, lets you download a copy of your Google presence.By: Chris Null If you listen to the growing chorus of online chatter about the company, Google’s now-infamous “Don’t be evil” slogan is becoming increasingly inaccurate by the day. The company’s most recent move–a sweeping change that consolidated

Uncover your Google search records with Google Takeout Read More »

Instant decryption of MS Office 2010 documents now possible

Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version instantly decrypts PGP Whole Disk Encrypted volumes and recovers passwords for Apple disk images.“Until now, there had been no solution available commercially to crack MS Office 2007-2010 encryption in predictable

Instant decryption of MS Office 2010 documents now possible Read More »