Quantcast
Channel: Leonardo Musumeci
Browsing all 34 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Secure Erasing Android Devices Guide for the Super Paranoid Seller.

Any of my friends would tell you that I’m crazy paranoid about malicious users–especially when I sell off my old electronics. I’m the type of guy who’d prefer to put a nail through an old device....

View Article


Image may be NSFW.
Clik here to view.

Malicious Apps Can Make Android Phones Useless

Security researchers said they have uncovered bugs in Google’s Android operating system that could allow malicious apps to send vulnerable devices into a spiral of endlessly looping crashes and...

View Article


Image may be NSFW.
Clik here to view.

Money Laundered through Online Gambling Sites

A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years,...

View Article

Image may be NSFW.
Clik here to view.

Pirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet

Pretty smart idea this one, we wrote about Yahoo! spreading Bitcoin mining malware back in January, but we haven’t really seen any of that type of activity since then. But this, this is a much better...

View Article

Image may be NSFW.
Clik here to view.

Yes, your smartphone camera can be used to spy on you…

Yes, smartphone cameras can be used to spy on you – if you’re not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the...

View Article


Image may be NSFW.
Clik here to view.

Cybercrooks Breed Self-Cloning Mutant That Steals Your Bank Details

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo)...

View Article

Image may be NSFW.
Clik here to view.

Hacking Your Fridge – Internet of Things Security

So one of the latest fads is IoT or the Internet of things phenomena which has been talked about for a while (especially since the discussion of IPv6 started), IoT is connecting physical items to the...

View Article

Image may be NSFW.
Clik here to view.

Clear Your Cookies? You Can’t Escape Canvas Fingerprinting

So tracking is getting even trickier, it seems canvas fingerprinting would work in any browser that supports HTML5 and is pretty hard to stop as a user, as it’s a basic feature (a website instructing...

View Article


The Fundamental Insecurity of USB

p>This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can’t stop this newer flavor of infection: Even if users...

View Article


Image may be NSFW.
Clik here to view.

How To Dissect Android Simplelocker Ransomware

In this blog post we’ll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone. This is the first...

View Article

Mousejacking – what you need to know

US startup Bastille Networks boldly claims to be “the first and only company to completely secure the Enterprise,” even though it doesn’t have any products on its website yet. But it is nevertheless...

View Article

Image may be NSFW.
Clik here to view.

Petya: Disk Encrypting Ransomware

Updated 2016-04-03: Edited to add more details about the encryption scheme. Petya is a new ransomware with an evil twist: instead of encrypting files on disk, it will lock the entire disk, rendering it...

View Article

Image may be NSFW.
Clik here to view.

Petya key decoder

I made a decoder for key of Petya ransomware. It works for Stage 1 of encryption – if the system was not rebooted after the infection. Research about a possibility to decrypt Stage 2 is in progress....

View Article


Cheating in Marathon Running

Story of Julie Miller, who cheated in multiple triathlon races: The difference between cheating in 1980 and cheating today is that it’s much harder to get away with now. What trips up contemporary...

View Article

Why you can’t trust things you copy and paste from web pages

Put away your wget and curl, your SOAP clients and WSDLs, WebDAV servers, REST APIs and JSON callbacks; when it comes to moving data off websites and on to your computer the sticky stuff that greases...

View Article


Image may be NSFW.
Clik here to view.

Decrypting the WhatsApp Database

INTRODUCTION WhatsApp Messenger is an application used across various Mobile Platforms for instant messaging. It uses the internet to send and receive audios, videos, documents, location details,...

View Article

Hacking Your Computer Monitor

Here’s an interesting hack against a computer’s monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor without getting into your actual...

View Article


Image may be NSFW.
Clik here to view.

Seriously, Put Away The Foil

I was scanning the headlines this morning, as I do, and came across this article by YLE Uutiset (News). — “Finnish police: Keep your car keys in the fridge” From YLE’s article: “These so-called smart...

View Article

Image may be NSFW.
Clik here to view.

NoScript is harmful and promotes Malware!

NoScript proudly calls itself a security extension advertising itself as an extension with “whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known...

View Article

Image may be NSFW.
Clik here to view.

5900 online stores found skimming [analysis]

Update Oct 17th: already 841 stores have been fixed! Thanks to everybody who tirelessly notified and fixed stores. Update Oct 14th: Github has booted my data and I have moved to Gitlab (statement from...

View Article
Browsing all 34 articles
Browse latest View live