Antonio Ieranò

Elezioni a Milano: un esempio di umorismo per tutti.

Image via Wikipedia Sigh Ogni tanto si potrebbe avere la speranza di vedere un barlume di dignità nella nostra politica, ma è sempre più difficile. sento il telegiornale di stamattina e scopro che il candidato alla poltrona di sindaco della area di sinistra Giuliano Pisapia querela la candidata del PDL Letizia Moratti per diffamazione. Diffamazione, insomma solo per il fatto d aver detto in diretta TV una menzogna affermando che Pisapia era stato condannato e poi ammistiato per un reato (furto d’auto da usarsi per rapire e picchiare un ragazzo) di cui, invece, è stato assolto con formula piena (ovvero…

PostOffice: Mobile users and security (Update)

PostOffice: “Mobile users and security (Update)0 commentswe finally have also the abstract and the agenda of the Clusit training that Alessio Pennasilico and I will held. here you are(check clusit website for registration and location) https://edu.clusit.it/ At first was the computer on the desktop. The, a day the modem comes home, and VPN and then laptop computers. And desktops were changed by laptops, and then mobile phones and we started to use them as modems, exchange mails, then arrived wap browsing, and after that the full browser ones, and complex web applications and smarthphones, tablets… https://clusit.it/” Related posts: Whoops! Check…

PostOffice: A Facebook Hack

Image via CrunchBasePostOffice: A Facebook Hack: “A Facebook Hack OK I do not have an account on Facebook, but as many of us I know there is some danger there (I read I listen and pretend to understand those issues usually, lol).Saturday my wife comes to me (she has a Facebook account) telling that some of her contacts have been hacked.” Related articles Facebook’s Hack-A-Months Cause Disruption, Innovation (fastcompany.com) Facebook Scams You Need To Know About: The 9 Most Common Hacks And Attacks (huffingtonpost.com) Privacy Hacking Worse Than PR Flacking (yro.slashdot.org) Facebook Spam: I Have Hacked Facebook Account (shoutmeloud.com) Script…

Privacy in the age of the social media « The Puchi Herald

Image via CrunchBasePrivacy in the age of the social media « The Puchi Herald: “ Do you know Mr. George Bronk? He’s a “smart” guy, using a little social engineering and a good dose of smartass brain he hacked a lot of women’s account Facebook and email, checking for hot sexy pics of the owners.” Related articles Privacy Hacking Worse Than PR Flacking (yro.slashdot.org) JOURNALIST ARRESTED OVER FACEBOOK PRIVACY REPORT (Media; Social Media) (thepulsemagazine.onsugar.com) Lawyer: Facebook abuser doesn’t deserve prison (sfgate.com) Facebook’s Hack-A-Months Cause Disruption, Innovation (fastcompany.com) Microsoft states that 1 in 14 downloads is malicious (theinformativereport.com) 3 Ways to…

PostOffice: New Cisco securtity report

Image via CrunchBasePostOffice: New Cisco securtity report Related articles Cisco debuts ‘private cloud’ controller (networkworld.com) Related posts: Ise Training day 2 « The Puchi Herald: A.I. Tech Update Configure cisco ISE for Cisco Access Points Is Big C missing the point on security? Diary of an acquisition part1 What if… Powered by YARPP.

Elezioni amministrative: tutti hanno vinto

Image via Wikipedia E ci risiamo, ancora una volta mi trovo di fronte ad un dilemma amletico: va bene che chi si accontenta gode, ma come è possibile che ancora una volta alle elezioni in Italia vincano tutti? Insomma, è vero che il PDL ha dichiarato un piccolo probelma in quel di Milano, ma a sentire denis verdini è evidente guardando I numeri che il PDL si è fondamentalmente riconfermato ed al massino si puo parlare di pareggio. Manco facessimo la schedina del totocalcio: ma da quando alle elezioni si pareggia? Allo stesso tempo il buon Bersani che si trova…

Talking Points–Security week review

Talking Points Security week review First of all sorry for the late publishing, but as some of you could have noticed the blogger platform experienced a failure this Friday that hold also to some post and comment being lost. so it s not only Amazon cloud service that fails .Speaking of failure the PSN affair is still on the news, the network is still experiencing problems, and some security analysts says they’re still far away from providing a decent level of security. I’m afraid this is not the end of the story. we’ll see more news on this I’m pretty…

Talking Points

Image via Wikipedia Talking Points Plenty of stuffs this week, as usual, we cannot start without talking about the Royal Wedding Today is the day, the royal wedding is coming and everyone is so excited that can’t stop himself from opening any email, link, search result or whatever related to the biggest event in human history .Ok may be a little too much but for sure the royal wedding event is moving tons of gadget, interest and cybercriminal activities online but how could not expect something like this, where media are so deeply involved?as a matter of fact several security…

TCP Split Handshake Issue

Image via WikipediaTCP Split Handshake Issue those days I’ve read on the news a lot of noise about an NSS test that were reporting a TCP handshake security hole (TCP Split Handshake Issue) in several commercial firewalls. The question is interesting from several points of view: are IPS and firewall really secure? is a vulnerability really a security issue? how does this vulnerability affect me? http://portadiferro.blogspot.com/2011/04/tcp-split-handshake-issue.html Related articles Other Considerations On TCP Split Handshake (paulsparrows.wordpress.com) TCP Split Handshake: Why Cisco ASA is not susceptible (paulsparrows.wordpress.com) TCP Split Handshake: The (Never)ending Story… (paulsparrows.wordpress.com) TCP Split Handshake Attack Explained (paulsparrows.wordpress.com) Hacker ‘handshake’…

Securing IPv6

Image via Wikipedia In this post, we’ll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks. View article… Related articles Securing IPv6 (blogs.cisco.com) Adventures in IPv6: Reliability and privacy concerns (bens.me.uk) IPv6 versus NAT (and…

Posts navigation