rpozzuolo

57 Flips | 6 Magazines | 52 Likes | 3 Following | 3 Followers | @rpozzuolo | Keep up with rpozzuolo on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “rpozzuolo”

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are …

White Hat

Secondo quanto emerso da una ricerca condotta da <b>Check Point Software Technologies</b>, società israeliana che si occupa di sicurezza informatica, <b>su</b> …

Stop Using WhatsApp If You Care About Your Privacy

Privacy has always been a key feature and popular selling point for the messaging app WhatsApp. Company co-founder Jan Koum grew up in the Soviet …

How to Edit Photos in Lightroom & Photoshop Like a Pro. One Photographer Reveals Her Workflow Secrets

Julia Trotti is a photographer we feature a lot on Shutterbug.com because she always has a great way of explaining how she captures her …

The dark web and how to access it

In 2015, the founder of a website called the Silk Road was sentenced to life in prison. The billion-dollar black market site was once the premiere …

Privacy

How to Know if Your Facebook Data Was Accessed by Cambridge Analytica

- Apr 12, 2018<p>As the numbers from the Cambridge Analytica Facebook scandal continue to grow, (It’s believed that up to 87 million account holders may …

Come ripulire i vostri account dai follower finti o inattivi - Wired

I numeri sugli account social sono uno strano magma: una <b>pletora di follower</b> che legge e interagisce, una quota di seguaci fasulli che va considerata …

There's a Secret Code Thieves Use to Break Into Hotel Safes (Video)

An expert lock picker reveals the trick that makes many hotel safes essentially useless.<p>If you thought putting your valuables inside a hotel safe …

chaiOS "Text Bomb" Crashes iMessage App on macOS and iOS

Reminiscent of the old "Effective Power" bug that has long caused iMessage apps to crash on iOS devices, a new bug nicknamed chaiOS has surfaced this …

A Complete Guide to Organizing Your Photos in Lightroom and Maintaining an Efficient Workflow

In addition to being the place where you perform a lot of edits on your photos, Lightroom is an excellent program for cataloging and organizing …

Tutorials

Kodak Scanza is a portable, budget film scanner that turns negatives into JPEGs

Kodak has launched a new budget scanner that digitizes film and slides. The scanner, called the Kodak Scanza, is compact at just 12cm x 12.7cm (4.7in …

Scanners

This is the easiest way to check if your Windows PC is vulnerable to Spectre and Meltdown

You’ll no doubt be aware of the Spectre and Meltdown processor bugs, as well as the many problems caused by the patches pushed out to address them. …

Diving into the depths of the Dark Web

Code signing certificates can be bought for under £1000 each, offering a back door into your system.<p>Sitting alongside millions of legitimate …

PoisonTap $5 Device Can Hack Even Password-Protected PCs

The most expensive security systems running on the most advanced devices can now be circumvented using nothing more than a $5 tool and access to a …

Information Security

L'incredibile APP che colora le foto in bianco e nero

Con l’avvento del digitale sono nate svariate APP e altrettanti software di post-produzione che con pochissimi click ci permettono di trasformare …

Dialoghi fotografici: la nuova collana di libri di Marcello Mencarini

A tutti noi, quando dobbiamo fare scelte o affrontare nuove esperienze, piacerebbe avere un amico esperto in quel particolare settore. Un amico …

VIDEO: Accessing the Dark Web with TOR Search on an Ubuntu Virtual Machine

Over the past few months, BrightPlanet has created a series of how-to educational videos regarding the setup process and uses of different Dark Web …

Data Protection Impact Assessment (DPIA) – Considerazioni sulle linee guida del WP29

avv. Davide Cautela – Consulente Privacy.it<p>Pubblicato in data 03-10-2017<p>Nell’aprile del 2017 il WP29, nell’esercizio di una delle sue funzioni …

How to Search the Deep Web Safely

The deep web and its inner recess, the dark web—those less well-trodden parts of the internet beyond the reach of Google and Bing—are not for the …

Connecting You with Information Security

Hotel Cyber Attacks: How Guests Can Stay Safe

Another day, another data breach.<p>This time, Sabre, one of the world’s largest technology companies, is reporting that “an incident of unauthorized …

REGALO ECCEZIONALE: oggi GRATIS un'app per scattare ottime foto anche al buio!

Oggi, in via del tutto eccezionale, potete scaricare GRATUITAMENTE da App Store un'app che fara' ottenere ai vostri scatti fotografici ottimi …

All smartphone users should take away these two lessons from the CIA Wikileaks files

This week, WikiLeaks released “Vault 7″—a roughly 8,000-page document purporting to detail surveillance tools and tactics of the Central Intelligence Agency. The leak appears to outline a wide variety of vulnerabilities in smartphones and other devices that the CIA uses to intercept communications …

Information Systems

Con 30 dollari potete spiare chiunque in tempo reale

Bastano 30 dollari e il numero di telefono di una persona per poter tracciare ogni suo spostamento in tempo reale. A fornire questo servizio è il …

Cyber-sicurezza, approvato il nuovo programma nazionale e un nuovo decreto

Il Comitato Interministeriale per la Sicurezza della Repubblica ha approvato il nuovo programma nazionale sulla cyber-sicurezza e un nuovo decreto …

Over 140 banks, government systems, and others hit by ‘invisible’ malware

A sophisticated, difficult-to-detect piece of malware has wormed its way onto the systems of more than 140 banks, government agencies, and enterprise …

Kaspersky Lab

Simple Gmail spoofing leaves users open to targeted attacks

Gmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come …

Information Security

Dark net black markets are turning to bug bounty programs

Dark net black markets are taking a leaf out of many legit companies' book and turning to bounty hunters to find security flaws in their systems. Hansa Market is one of them. According to <i>CyberScoop</i>, the marketplace, which brought in $3 million last year, has launched a bug bounty program offering …