Those, like me, who are old school people and lived the golden age of Spanish underground, we tend to miss those days when everything was much more fun than now. We used Windows 3.1 for groups work, we uprooted from…
Those, like me, who are old school people and lived the golden age of Spanish underground, we tend to miss those days when everything was much more fun than now. We used Windows 3.1 for groups work, we uprooted from…
Information. Does anyone doubt that having sufficient information is not half victory? The phrase “information is power”, was said for a reason. In Security, having the necessary information is vital to know where to move, which elements exist and which…
Cryptocurrencies are increasingly taking force. 5 years ago it was difficult to make any payment with them, but today it is quite a common practice. Although there are still people who directly associate them with ransomware payments (to decrypt infected computers)…
Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may…
In relation to Titulo X, we will focus on the new aspects of the recent reform of Lo 10/95 23 de noviembre (a number of criminal types arise).This article, keeps a wide connection with the spirit and purpose of the…
Malware on mobile devices is very common. Although this is something quite obvious to anyone in the world of security, many people still think that their smartphone or tablet this out of any danger. Lately the Android world has gone through difficult times,…