Results

0 Entities | 4 Marked | 0 Connections

| 2 credits left

JSON MARKUP

Use Google Structured Data Testing tool to test this markup

Note : Semantic Markup has been restricted to first entities as you are not logged in.

<script type="application/ld+json">{"@context":"https://schema.org","@type": "WebPage","@id":"#main","mainEntityOfPage":{"@type":"WebPage", "@id":"http://andreafortuna.org"}, "headline":"Andrea Fortuna","description":"Cybersecurity expert, software developer, experienced digital forensic analyst, musician","about":[{"@type": "Organization","name": "Department of Justice"},{"@type": "Person","name": "Ronnie Wyden"},{"@type": "Organization","name": "Gamaredon"}],"author":{"@type":"Organization","url":"/","name":"/"},"publisher":{"@type":"Organization", "name":"/", "url":"/", "logo": {"@type": "ImageObject", "url": "http://www.example.com", "width": 4, "height": 97}},"datePublished":"2024-04-26T17:30:13","dateModified":"2024-04-26T17:30:13"}</script>

100% ACCURACY
GUARANTED !

Just ask us to configure SemanticMarker to exactly fit your content...

... and it will deliver 100% accurate detailed Schema Markup.

MICRODATA

WordEntityTypeCategoryWikidataFreq.Validate
Department of Justice - Organization - - 25 %
<span itemscope itemtype="http://schema.org/Organization">
        <span itemprop="name">Department of Justice</span>
</span>
Ronnie Wyden - Person - - 25 %
<span itemscope itemtype="http://schema.org/Person">
        <span itemprop="name">Ronnie Wyden</span>
</span>
Gamaredon - Organization - - 50 %
<span itemscope itemtype="http://schema.org/Organization">
        <span itemprop="name">Gamaredon</span>
</span>

TEXT

Andrea Fortuna | Cybersecurity expert, software developer, experienced digital forensic analyst, musician

Andrea Fortuna

Cybersecurity expert, software developer, experienced digital forensic analyst, musician

OSINT investigations using the Wayback Machine

The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations.

Â"

Is Your Pixel Safe? Google Acknowledges Exploited Vulnerabilities

Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws could potentially allow unauthorised access to user data.

Â"

XZ Backdoor: A Stealthy Attack on Linux Systems (CVE-2024-3094)

On March 29 , 2024, a serious security vulnerability was discovered in the XZ Utils library. This library is used by many Linux distributions for data compression. The vulnerability, which has been assigned the CVE identifier CVE-2024-3094, is a backdoor that

Â"

8 Ways to Stop Procrastinating

Procrastination is the act of delaying or postponing a task or set of tasks.

Â"

Integrating Password Manager pass into i3 Desktop Environment with Bash Script

Today I'd like to show you my setup for integrate the pass password manager into the i3 desktop environment using a Bash script.

Â"

Are push notifications being used to spy on users?

In a letter to the Department of Justice<span itemscope itemtype="http://schema.org/Organization">
        <span itemprop="name">Department of Justice</span>
</span>
, Senator Ronnie Wyden<span itemscope itemtype="http://schema.org/Person">
        <span itemprop="name">Ronnie Wyden</span>
</span>
reveals foreign governments have been spying on how American citizens use their iPhones and Android phones through push notifications.

Â"

LitterDrifter: a new USB worm used by the Gamaredon group

The Russian cyber espionage group Gamaredon<span itemscope itemtype="http://schema.org/Organization">
        <span itemprop="name">Gamaredon</span>
</span>
, affiliated with Russia's Federal Security Service (FSB), has been observed using a worm called LitterDrifter, which spreads through USB devices in targeted attacks against Ukrainian entities. This tactic signifies an evolution in the group's

Â"

Android and privacy: my guidelines

At first glance, the relationship between privacy on Android phones may seem complicated.

Cybersecurity expert, software developer, experienced digital forensic analyst, musician


> api_Check - TIME: 0.01
> api_Load - TIME: 0
> api_Format - TIME: 0.34
> api_Cat - TIME: 0.14
> api_Get - TIME: 0.16
> api_beforeFind - TIME: 0.05
> api_afterFind - TIME: 0.03
> api_afterPlaces - TIME: 0.02
> api_afterProducts - TIME: 0.04
> api_afterMovies - TIME: 0
> api_Match - TIME: 0.15
> api_Comp - TIME: 0.08
> api_Disp - TIME: 0.01