Vicente started working in security within Thales, and is currently team leader in SIA group. I’m sure many of you have read his blog more than once, Hackplayers. It has been recognized as one of the community’s reference blogs and…
Iskander Sanchez-RolaFounder/Content Director
Expertise: Web Security and Privacy
iskander-sanchez-rola.com
Vicente started working in security within Thales, and is currently team leader in SIA group. I’m sure many of you have read his blog more than once, Hackplayers. It has been recognized as one of the community’s reference blogs and…
Although hacking began as simple entertainment for a group of enthusiastic young people, much has changed since then. Today, all countries have, to a greater or lesser extent, a response or attack group of this type. The clearest examples would…
It is possible to access any content through a different network than the one we initially encountered. With a simple example, if we were initially in Spain, we could access a certain web page as if we were really in…
There is a new trend in the world of malware, called cryptojacking. In many wars they used enemy prisoners to mine minerals, this would be similar to this case but transferred to the 21st century. It consists in using the…
Not all malware executes its malicious payload instantly as soon as they are downloaded and executed for the first time. Many times, these are kept in the shadow and are triggered only when a certain situation occurs (something like an…
When someone finds out that your computer is infected, a question automatically pops up in your mind, how has this happened? First you think about the recent files downloaded / installed, then in the visited pages, and if no answer…