To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has…
To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has…
Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some…
In this post we are going to talk about two options that can happen to the linker to make certain sections of our executable more secure: -Wl, -z, relro, -z, now. When a program calls a function not defined in…
Since ancient times, scam has been a practice carried out by scammers in order to gain a benefit (usually economic) through deception or social engineering techniques. The number of known campaigns is enormous and, unfortunately, increases as technology media advances.…
There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1…
The hiding of information in places that initially seem innocuous has been and is a widely used method. The biggest advantage of steganography is that sent messages can go completely unnoticed, since no one can think that they hide something…