Portable experiments (II) – “Recipes” for VMs


In the previous post we talked about Vagrant, a tool that can help us manage the creation of virtual machines. In this post we will focus on another tool called Ansible. It is based on the concept of roles: on

Research in USA and in Spain


It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

An interview with Miguel A. Arroyo (@miguel_arroyo76)

Cloud on circuit background, cloud computing concept

Miguel is a very committed person with security, who tries to spread his passion to the greatest number of people (ratifiable by anyone who has attended one of his talks). He is the propeller of the Hack & Beers community

Applications of cybercrime legal framework (III)


In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

Hardening binaries (IV) – VTV


In the previous post of this series we discussed how Google had included Asan in GCC to detect memory corruption errors. Virtual-Table Verification (VTV) is another option of GCC (> 4.9) developed by Google to try to prevent attacks that

Portable experiments (I) – VMs with Vagrant


All programmer or researcher need to create development environments or experiments. It is highly desirable that this environments are portable and easily reproducible. The use of virtual machines and / or containers can offer this. There are several tools that

Security Research (VI) – Papers, Structure


After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

Backdoors, I don’t remember opening that door


Although many people have never heard of them, backdoors are one of the most frequently methods used nowadays to perform malicious attacks. Leaving aside the specific case of the backdoors in cryptographic algorithms, backdoors allows access to a particular computer

It’s time to vote


Once again the prestigious annual Bitacoras Awards voting start. Last year we had the honor of being ranked 23rd in the category of best computer security blog, above many reference blogs. The truth is that this encouraged us to continue even with

Applications of cybercrime legal framework (II)


In this post we will summarize the resolution 161/2010 of the Criminal court number two of Salamanca where the absence of criminal liability is settled on a denial-of-service attack to a web server of the Cancer Research Center, that at