A nice phishing attempt
A few weeks ago I suffered a rather impressive phishing attempt via Twitter. I wanted to analyze it, understand why it didn’t work, and how the attacker could have done…
Continue readingA few weeks ago I suffered a rather impressive phishing attempt via Twitter. I wanted to analyze it, understand why it didn’t work, and how the attacker could have done…
Continue readingThis article is a CheatSheet dedicated to WSL2 (Windows subsystem for Linux), a kind of memo, or survival guide in the list of useful commands.I tried to write down all…
Continue readingIPhone, Apple, Google, Facebook, Whatsapp, IOS, Android, Internet… Trackers, control and security of your data… Find out how your devices intelligently track your activity on the internet.
Continue reading