Tech Update in English

English

Security and Risks Updated

When I’m talking about security with customers, partners or at an event the first question I usually receive is: how much this will cost to me? This is an understandable question, costs have to be monitored and expenditures have to be planned wisely;  how much I can spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seemed to be attracted more by strange inner believes than an empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that…

Is Sandboxing technology the answer?

Most of the security solutions in the market those days leverage sandboxing technologies to deal with Advanced Persistent Threats,  “0”days vulnerability, target attack and so on. It would be interesting to analyze the good and the limits of this kind of technologies to be able to better choose our security solutions. What is a Sandbox? sandboxing means to create a “virtual”, “fake” image that can be targeted by malware attackers o unknown security problems. Monitoring the change that happen to this decoy it is possible to understand if something strange is going on. The idea basically is that since the fake machine…

“Shellshock …I told you so”

  A few consideration on the new vulnerability discovered and all the rumors around. Related articles Shellshock on Playbook New Shellshock Patches Tackles Most Vulnerabilities of the Computer – Capital OTC Shellshock protection enabled for all customers Shellshock Exploit Attempts Continue in China Shellshock Vulnerability Is Impressive in Both Magnitude and Simplicity Shellshock in the Wild What Is Shellshock, How Does It Work and Why Does It Matter? – Mashable Bash “Shellshock” vulnerability – what you need to know | Naked Security Shellshock strikes Bash “Shellshock” vulnerability – what you need to know | Naked Security Related posts: Nmap Guide…

Sorry, I’m experiencing some issues with some plugins

It could happen that you are experiencing problems visiting my WordPress blog, some plugins could have hiccups or weird output. I’ve just changed the cache engine to allow users to have a better and faster experience, but seems that still there are a few compatibility issues with the current wordpress version. I’m working on it 🙂 and waiting for some updates, till then please be patient 🙂   thanks Antonio   Related articles Not All WordPress Caching Plugins Are the Same 10 WordPress Plugins for a Faster, More Search Friendly Blog Fragment Caching in WordPress 6 WordPress Plugins for Debugging Most…

My Latest Article on Hakin9 is on Ddos

It has been released the latest edition of Hakin9 Magazine, and I’ve been so lucky to have another article published, this time on DDos. If you are interested on the subject or the issue just go to: https://hakin9.org/ddos-attacks-and-prevention/ Hope will be a pleasant reading 🙂 for any question do not hesitate to contact me. you can reach me on: twitter: @antonioierano and @thepuchiherald linkedin: it.linkedin.com/in/antonioierano/ as usual I’ll be glad if you join my networks. ciao Antonio Related articles FDL Under DDoS Attack: We Need Your Help Incapsula launches added protection against DDoS attacks DDoS Hosting Solutions Increases its DDoS Protection…

Wireshark, Tools and forensic

  Intro   Making a forensic analysis means to be able to collect and analyze data in order to find out evidence that could led you to a specific break.   Although is usually considered a post-mortem activity in the IT realm this aspect is less marked than in other forensic environment. If we are running an investigation on a homicide, as an example, we will be present when everything is already done, and we just have to collect cold evidence. On the other end when we are running a forensic IT investigation we cannot be sure that the event…

Download a eForensic magazine free copy with my latest article

I would like to invite you to download the latest copy of eForensic Magazine with my latest Article free. Is a 30$ gift, hope you enjoy 🙂 I have only a limited number of downloads available so the sooner the better http://eforensicsmag.com/network-toolbox/     Related posts: Appunti sulla Costituzione Italiana, Art. 2. PostOffice has a new home PostOffice: A Facebook Hack An Embarassing mistake or an hidden message? My Latest Article on Hakin9 is on Ddos Powered by YARPP.

Look what I found

While digging some pictures for my website i found a few old certifications of mine, the old MCP one, the MCT MCSE that state since 1996, even the Cisco Ironport Certification (I used to be a trainer) and the old ASE and ACT compaq certification. Geez I feel so old. in the same dig i were trying to find pictures of my previous job activities but I’m afraid I were not able to find anything. But at least I found a few old business card, I have never been a huge fan of Business Cards so it was quite a…

Foretelling: Will Crystal Balls Run On Android?

  TECHNOLOGY   Foretelling: Will Crystal Balls Run On Android?   By Antonio Ieranò on November 3, 2013 at 10:22 AM   It is always good to take a look at the people in the metro or train to get a better sense of the impact of technology in our lives. Consumers’ rapidly evolving and new tastes become apparent, a process that should interest anyone with some interest in where we are headed. Until not very long ago, it was common to see few commuters reading newspapers or magazines while most stood up trying not sleep. Today things have changed. The expansion…

Wanted Dead or Alive: The Human Factor

TECHNOLOGY originally published on DaftBlogger.com Wanted Dead or Alive: The Human Factor By Antonio Ieranò on September 29, 2013 at 7:45 PM Contents [hide] 1 From where should we start? 2 I said it all but… 3 Theory? OK I confess I am quite bored to listen to all those knowledgeable IT security experts talking about what is needed to secure a system. Everyone has his own point of view; of course they’re right when they say we need end-point security, mobile protection, anti-malware, anti-hacking, dlp, advance threat defense and protection. We all know we need firewalls, IPSIDS, cypher encryption systems, SSO, 802.1x, strong authentication, anti-virus, anti-everything,…

Posts navigation