Underground memories

Those, like me, who are old school people and lived the golden age of Spanish underground, we tend to miss those days when everything was much more fun than now. We used Windows 3.1  for groups work, we uprooted from

Information is power

Information. Does anyone doubt that having sufficient information is not half victory? The phrase “information is power”, was said for a reason. In Security, having the necessary information is vital to know where to move, which elements exist and which

Bitcoin, the digital currency that changes the rules

Cryptocurrencies are increasingly taking force. 5 years ago it was difficult to make any payment with them, but today it is quite a common practice. Although there are still people who directly associate them with ransomware payments (to decrypt infected computers)

Hardening binaries (I) – The stack

Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may

Cybercrime and legal framework (II)

In relation to Titulo X, we will focus on the new aspects of the recent reform of Lo 10/95 23 de noviembre (a number of criminal types arise).This article, keeps a wide connection with the spirit and purpose of the

Malicious apps exist and live among us

Malware on mobile devices is very common. Although this is something quite obvious to anyone in the world of security, many people still think that their smartphone or tablet this out of any danger. Lately the Android world has gone through difficult times,