"Apple, come funziona la nuova app Password"
L'ultimo aggiornamento software di Apple per iPhone, iOs 18, è arrivato ieri e include una nuova app: Password. Per la prima volta, il colosso sfrutta la capacità di salvare i dati di accesso del suo smartpho… buff.ly/3MM42dl
"Triple Trouble. iOS 16, Android 14, and iOS 17 Images Now Available!"
Right as rain
While it wasn’t as “soon” as I would have liked, I am (finally) pleased to announce the availability of public images of iOS 16, Android 14, and iOS 17.
A few notes. … buff.ly/3MPpyOg
"A first look at iOS 18 forensics"
This has been a tough year for me: my mom passed away in June, and I'm still slowly recovering from the hard blow. It's time to start again doing what I love: researching and sharing!
It's early September and like eve… buff.ly/3MMUU83
"Remotely Exploding Pagers"
Wow.
It seems they all exploded simultaneously, which means they were triggered.
Were they each tampered with physically, or did someone figure out how to trigger a thermal runaway remotely? Supply chain attack? Malicious c… buff.ly/3MMSg27
"Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure"
Sep 16, 2024Ravie LakshmananSpyware / Threat Intelligence
Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO … buff.ly/3XNN2K4
"What is Brute Force Attacks?"
In cybersecurity, brute force attacks are a well-known and persistent threat. Despite being one of the oldest methods hackers use, brute force attacks remain a popular and effective tactic for gaining unauthorized access t… buff.ly/4etGMN4
"Say Goodbye to Stolen iPhone Parts: Activation Lock Gets an Upgrade"
Once Lost Mode is activated on an Apple device, it is incredibly difficult to disable unless done by the original owner or with the correct password. Without deactivating Lost Mode, t… buff.ly/3XsAmqo
"Quishing, come funziona la truffa del QR code. Il caso delle colonnine di ricarica"
Si chiama ‘quishing‘ ed è il nuovo termine da aggiungere alla lunga lista di nomi che identificano le truffe ad opera di cybercriminali. Si tratta di una frode che nasc… buff.ly/4erSnw4
"How to Jailbreak iOS 18 – Full Guide"
How to Jailbreak iOS 18 – Full Guide iDevice Central GeoSn0w
If you want to jailbreak iOS 18, at the moment your choices depend on the device type you have. Jailbreaking iOS 18 is indeed possible in 2024, but it hig… buff.ly/4e8UkNW
"Australian Police conducted supply chain attack on criminal collaborationware"
Australia's Federal Police (AFP) yesterday arrested and charged a man with creating and administering an app named Ghost that was allegedly "a dedicated encrypted communicat… buff.ly/4e8UULC
"Analisi dell'attacco ad Hezbollah tramite i cercapersone"
Gli attacchi mirati che coinvolgono dispositivi modificati, come cercapersone o cellulari trasformati in ordigni esplosivi, rappresentano una delle tecniche più ingegnose adottate in operazioni … buff.ly/3MR4eYO
"iOS Telegram Forensics. Part I: Acquisition and Database Analysis"
In digital forensic investigations and cyber incident response procedures, Telegram, like many messengers and social apps, can reveal a considerable amount of information about its user… buff.ly/4epOCXQ
"Cops lure pedophiles with AI pics of teen girl. Ethical triumph or new disaster?"
Aurich Lawson | Getty Images
Cops are now using AI to generate images of fake kids, which are helping them catch child predators online, a lawsuit filed by the state of … buff.ly/3MFF6nq
"Cracking OneDrive's Personal Vault"
Sometimes in digital forensics there is a need to gain access to encrypted data sources. This can come in many forms including zip files, TrueCrypt/VeraCrypt, KeePass and BitLocker. OneDrive's Personal Vault is no ex… buff.ly/4gFdInE
"macOS 15 (Sequoia): What Forensic Examiners Need to Know"
Apple’s latest macOS 15 (Sequoia) is packed with updates that could impact forensic investigations, especially for examiners dealing with Apple devices. With new privacy features, expanded func… buff.ly/4e9SQmI
"SambaSpy, il malware che colpisce solo gli utenti italiani"
Gli utenti italiani ancora una volta vittime di una sofisticata campagna malware, cominciata nel maggio 2024. A rivelarlo sono i ricercatori del Global Research and Analysis Team (GReAT) di Ka… buff.ly/3MSUddm
"Chinese Spies Built Massive Botnet of IoT Devices to Target US, Taiwan Military"
Researchers at Lumen Technologies have eyes on a massive, multi-tiered botnet of hijacked IoT devices being commandeered by a Chinese state-sponsored espionage hacking ope… buff.ly/3XOJhUG
"10 Ways to Detect Deepfakes Created by Text-to-image Services and GANs"
Reading time: 8 min
With deepfake images getting increasingly realistic, staying ahead of detection techniques is more important than ever. In this article, we explore various clue… buff.ly/4eL9jOj
"14 dead as Hezbollah walkie-talkies explode in second, deadlier attack"
Enlarge / Two radios said to have exploded in Lebanon, with photos later posted to social media.
Wireless communication devices have exploded again today across Lebanon in a secon… buff.ly/4daHwoX