Skip to content

Massimo Graziani

PEGASUS found on iphone

A library found on iPhone and iMac maybe is going to Alarm the TSCM community, if you are going in the file system, you can find the folder: group.com.apple.PegasusConfiguration So a lot of Apple users are asking if there are victim about the NSO Pegasus Spyware, but no,… Read More »PEGASUS found on iphone

YORKIE-PRO

GSM-WIFI-Bluetooth RF search system From Berkeley Varitronics Systems (BVS), a company that designs and manufactures world-class wireless security products for TSCM specialists and government organizations to manage the wireless security of secure facilities. The system serves to locate modern wireless, Wi-Fi, Bluetooth and 3G / 4G / 5G… Read More »YORKIE-PRO

Airtags follow you

I have been using Apple AirTags for some time to follow objects that I could lose or that could be stolen, this technology is comparable to a real GPS, years ago I found that by disassembling them they can be inserted into any object, especially if we move… Read More »Airtags follow you

Forensic reports and the utc

How to correctly read dates and times on Cellebrite UFED forensic reports General information about the time Everything is based on the meridian of Greenwich, in Great Britain, which is the starting point, the so-called meridian Zero, where zero is the longitude. It crosses the Astronomical Observatory located in the… Read More »Forensic reports and the utc

FORENSIC FIELD

Computer forensics is the discipline of forensic science related to the acquisition of evidence from computers or other digital devices. The aim is to examine the electronic material following forensic analysis processes (guidelines, shared practices) in order to identify, preserve, acquire, recover, analyze and present evidence in a… Read More »FORENSIC FIELD

HACK5

The hacking swiss-tools bazar Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong. WWW.HAK5.ORG WIFI PENTESTING Automate WiFi auditing with all new campaigns and get actionable results… Read More »HACK5

Hacker

When you hear “hacker” word, what comes to your mind? Is the popular image of an unknown shady hooded figure from a basement stealing your digital identity? The truth is, hacking, just like technology, has morphed into a different, negative topic, but how were hackers born? It all… Read More »Hacker

Audio countermeasures

ANTI-WIRETAPPING To cut the interception of the conversions at the origin it is enough to act on the microphone, from years the market have listed different devices, like white noise, high audio noise room isolation with a headphone and microphone erase noise capable to use with conversationalists like… Read More »Audio countermeasures