You like playing Pokémon GO? Good, but not forget your privacy! Since this is an augmented reality game, Pokémon GO requires your GPS location and a data connection (either WiFi or cellular data), so you can …
Continue readingCategory: Cybersecurity
Useful penetration testing tools Cheat Sheet
Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery …
Continue readingOpenSSL Tips: how to generate a .pfx file from certificate and private key?
Do you need a .pfx file? You have the single certificate (.cer/.pem/.crt) and the private key (.key), but you need a single .pfx file (a passworded container format that contains both public and private certificate pairs) to install …
Continue reading
Telegram, WhatsApp and Signal: who is the best for security and privacy?
Spoiler Alert: it’s Signal!
Continue readingA DDoS Attack Powered by 25,000 CCTV Cameras
A new DDoS attack powered entirely by compromised CCTV units Security researchers of Sucuri have revealed a unique new DDoS attack launched against a small business, which was powered entirely by thousands of compromised CCTV units. …
Continue reading