Adapting the scam to these times

Since ancient times, scam has been a practice carried out by scammers in order to gain a benefit (usually economic) through deception or social engineering techniques. The number of known campaigns is enormous and, unfortunately, increases as technology media advances.

Information is power

Information. Does anyone doubt that having sufficient information is not half victory? The phrase “information is power”, was said for a reason. In Security, having the necessary information is vital to know where to move, which elements exist and which

WEKA, from data to information (Part III)

We return with a new article on WEKA. Following the introduction on how to prepare the environment and how use some basic functions, and the second part in which we tried to dig a little deeper into this tool, now it

WEKA, from data to information (Part II)

To start, let’s download a new dataset with features wine production: wine.arff. To view the content, we can open it directly and select Weka as the default tool or within the Explorer section. If we look at the attributes of the

WEKA, from data to information (Part I)

We start with the basics, installation and familiarization with the tool, and a simple example to see its possibilities. First, we download WEKA from the website of the University of Waikato in New Zealand. Within its download section, find the version

Starting as data scientist

Terabytes of data stored everywhere, in various places, to everyone. Which is the reason of it, if we don’t use them for anything? Let’s start analysing.  You can predict the future with them and  understand  situations that happened long ago, it’s

How much does your data cost?

Data here, data there. That new applicationwants to access my contacts, another new social network needs to know my location. Anyway, the service is trusted, I guess that if they asked for the information is because they really need it, right? We

PackerInspector

Our sandbox for packers

Categories