Iskander Sanchez-Rola
Founder/Content Director
Expertise: Web Security and Privacy
iskander-sanchez-rola.com

Reverse engineering on protected malware

Over time, we analyze many malware samples using reverse engineering to obtain and understand their real functionality. This process is an arduous task that may take some time depending on the complexity of the malware itself and the packer or packers used

The marketing behind zero-day vulnerabilities

In recent times, the landscape of zero-day vulnerabilities has been modified by a curious phenomenon, the marketing. And I am not referring to the technique used by hackers and security researchers to sell them, but to the system used for

Interview with David Barroso (@lostinsecurity)

With over 15 years dedicated to information security, David Barroso (@lostinsecurity) has become one of the most important references in the sector. As he likes to say, “Not one day goes by that I don’t ride, ’til the infinite, the horse of

Immersed in the Deep Web, hidden networks in sight

The network of networks hosts a lot of information that is separated into different layers, which allow to control the accessibility of the data stored there. Generally, it is called Deep Web to any page that is not indexed by

Binary palindrome years, the forgotten ones

2015 is a binary palindrome year. If you wonder what does that exactly mean, very simple, if we convert the year from decimal to binary we find that this number is palindrome (11111011111). It is an interesting fact that after realizing of it

Mind Hacking, the magic of social engineering

Many of you may be wondering what exactly is this type of attack, discover two of the most used techniques of social engineering (Traditional SE and Reverse SE). At the beginning of the last decade, an interesting film based on the novel titled Takedown appeared