One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers.…
A blog about IT, security and whatever crosses my mind
One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers.…
For my thesis I researched a lot of resources regarding honeypots, including a number of open-source softwares. Before I clean up my bookmark bar and…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…
One of the most popular hacking requests, besides “how to hack facebook”, is how to gain access to protected WiFi networks. Many years ago, this…
In the field of criminal investigations, it is often necessary to search for evidence on electronic devices. Digital traces can be found on computers, tablets,…
If you happen to own a Linux system, I am sure you already searched for solutions to problems on the Internet, only to find smart…
In the last months I have been working intensively with honeypots. Honeypots are real or simulated systems used to analyze and detect attacks in a…
Hello everyone, one of my favorite Open Source projects just got a significant update! With version 2.3.0 of KeepassXC, the team finally created an official…
At my current work, I am working with Android devices to detect overlays. The reason for this research are current attacks that abuse the Android…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…