Tech Update in English

English

ransomware again, really?

Some days ago a friend of mine reported me that his company has been affected by a ransomware cryptoloker style. I keep hearing people infected by this kind of infection and I am starting to wonder if people has really understood what a cryptomalware really is and how it works.   here from Wikipedia: ” Ransomware is a type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction. Some forms of ransomware systematically encrypt files on…

A Fight for the future message: The following companies just betrayed billions of people.

The following companies just betrayed billions of people. Apple, Microsoft, Adobe, Symantec, and a handful of other tech companies just began publicly lobbying Congress to pass the Cybersecurity Information Sharing Act (CISA), a bill that would give corporations total legal immunity when they share private user data with the government and with each other. Many of these companies have previously claimed to fight for their users’ privacy rights, but by supporting this bill they’ve made it clear that they’ve abandoned that position, and are willing to endanger their users’ security and civil rights in exchange for government handouts and protection….

I moved my site to the cloud

View image | gettyimages.com although I would like to say I reached a stellar audience this means just that I have changed my purchased hosting package from the very basic one to a “cloud” service offered by my hosting provider (bluehost.com http://cloud.bluehost.com/products/cloud-sites). Why I did this? well basically the main reason was to address a performance issue, every time a spammer (my basic audience) was trying to hack my site the system was not able to process the request and goes down. I mean it is not fair to have a blog and not being able to offer a minimum…

IoT, Internet of Things or Internet of Terror?

Why we all talk about IoT I know that there are a lot of good reasons to love the IoT or IoE (where E stand for everything) idea. I can just highlight a couple: Business and easier life. The business behind IoT The first point is quite clear, the tremendous growth of the Smart devices has create a new business that has gone beyond any analyst prevision. Nowadays it seems that it is impossible to think a world not interconnected. Anyway there are still great areas of improvement in terms of quality of the services provided and the spread of…

Security and Risks Updated

When I’m talking about security with customers, partners or at an event the first question I usually receive is: how much this will cost to me? This is an understandable question, costs have to be monitored and expenditures have to be planned wisely;  how much I can spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seemed to be attracted more by strange inner believes than an empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that…

Is Sandboxing technology the answer?

Most of the security solutions in the market those days leverage sandboxing technologies to deal with Advanced Persistent Threats,  “0”days vulnerability, target attack and so on. It would be interesting to analyze the good and the limits of this kind of technologies to be able to better choose our security solutions. What is a Sandbox? sandboxing means to create a “virtual”, “fake” image that can be targeted by malware attackers o unknown security problems. Monitoring the change that happen to this decoy it is possible to understand if something strange is going on. The idea basically is that since the fake machine…

“Shellshock …I told you so”

  A few consideration on the new vulnerability discovered and all the rumors around. Related articles Shellshock on Playbook New Shellshock Patches Tackles Most Vulnerabilities of the Computer – Capital OTC Shellshock protection enabled for all customers Shellshock Exploit Attempts Continue in China Shellshock Vulnerability Is Impressive in Both Magnitude and Simplicity Shellshock in the Wild What Is Shellshock, How Does It Work and Why Does It Matter? – Mashable Bash “Shellshock” vulnerability – what you need to know | Naked Security Shellshock strikes Bash “Shellshock” vulnerability – what you need to know | Naked Security Related posts: Nmap Guide…

Sorry, I’m experiencing some issues with some plugins

It could happen that you are experiencing problems visiting my WordPress blog, some plugins could have hiccups or weird output. I’ve just changed the cache engine to allow users to have a better and faster experience, but seems that still there are a few compatibility issues with the current wordpress version. I’m working on it 🙂 and waiting for some updates, till then please be patient 🙂   thanks Antonio   Related articles Not All WordPress Caching Plugins Are the Same 10 WordPress Plugins for a Faster, More Search Friendly Blog Fragment Caching in WordPress 6 WordPress Plugins for Debugging Most…

My Latest Article on Hakin9 is on Ddos

It has been released the latest edition of Hakin9 Magazine, and I’ve been so lucky to have another article published, this time on DDos. If you are interested on the subject or the issue just go to: https://hakin9.org/ddos-attacks-and-prevention/ Hope will be a pleasant reading 🙂 for any question do not hesitate to contact me. you can reach me on: twitter: @antonioierano and @thepuchiherald linkedin: it.linkedin.com/in/antonioierano/ as usual I’ll be glad if you join my networks. ciao Antonio Related articles FDL Under DDoS Attack: We Need Your Help Incapsula launches added protection against DDoS attacks DDoS Hosting Solutions Increases its DDoS Protection…

Wireshark, Tools and forensic

  Intro   Making a forensic analysis means to be able to collect and analyze data in order to find out evidence that could led you to a specific break.   Although is usually considered a post-mortem activity in the IT realm this aspect is less marked than in other forensic environment. If we are running an investigation on a homicide, as an example, we will be present when everything is already done, and we just have to collect cold evidence. On the other end when we are running a forensic IT investigation we cannot be sure that the event…

Posts navigation