Andrea Fortuna

@andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician

Vrijeme pridruživanja: siječanj 2019.

Medijski sadržaj

  1. 3. velj
  2. 31. sij
  3. 30. sij

    Last december, in a talk at , Samuel Groß () presented a report about an iOS vulnerability that allowed remote code execution on all iDevices up to 12.4. -2019-8641

  4. 29. sij

    A team of researchers from University of Michigan and University of Adelaide recently presented a new attack technique that targets that may allows leaks of sensitive data. -2020-0549…

  5. 28. sij
  6. 27. sij
  7. 24. sij

    The hijacking, also know as SIM swapping, is an attack where a criminal contacts the cell phone provider of a target user, and convinces it to switch target's account to a SIM that he control

  8. 23. sij

    Previously I've talked about : in order to move security checks to the early steps of development, a great help may come from a security-aware person in every team, the so-called "Security Champions"

  9. 22. sij
  10. 21. sij
  11. 20. sij
  12. 16. sij

    Recently, released a patch that fixes a critical vulnerability in the ' crypto library: interestingly, it was discovered by ! And yes, you have to update your systems, right now! -2020-0601

  13. 15. sij

    In context, the term "shift left" refers to the measures implemented to ensure that security concerns are taken into consideration during the whole application development, rather than at the end of the process

  14. 14. sij

    Many Proof-of-concept has been released for the unpatched in the Application Delivery Controller and Citrix Gateway products. What we need to know? -2019-19781

  15. 13. sij
  16. 10. sij

    is quite complex: in many cases, is the only way to gather all most information available in iOS devices. In this post i'd like to share my own acquisition workflow for iOS devices in (before first…

  17. 9. sij

    fixed several that could allow of accounts., but attackers may have had access to accounts contents: i suggest to perform a review of your account details and permissions.

  18. 8. sij

    In an interesting article, editors by Privacy International examines some aspects of digital forensics on mobile phones, from the acquisition process to the data analysis phase.

  19. 6. sij

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·