Legal framework of impersonation (I)

There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1

Steganography, cannot see the trees for the forest

The hiding of information in places that initially seem innocuous has been and is a widely used method. The biggest advantage of steganography is that sent messages can go completely unnoticed, since no one can think that they hide something

Merry ʎʇıʌɐɹƃ be with you

This year we decided to be multi-cultural and not just stick to one of the many parties celebrated around the winter solstice. So: Happy Mithra, Happy Hanukkah, Merry Christmas, Merry Christmas, Happy Saturnalia But above all, as scientists: Happy Day

Applications of cybercrime legal framework (IV)

The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

Hardening binaries (V) – UBSan

The indefinite behavior in C / C ++ is caused when there are no restrictions on the program behavior; which means, when the standard does not specify what the implementation should do, it is free to do what it seems,

Portable experiments (II) – “Recipes” for VMs

In the previous post we talked about Vagrant, a tool that can help us manage the creation of virtual machines. In this post we will focus on another tool called Ansible. It is based on the concept of roles: on

Research in USA and in Spain

It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

An interview with Miguel A. Arroyo (@miguel_arroyo76)

Miguel is a very committed person with security, who tries to spread his passion to the greatest number of people (ratifiable by anyone who has attended one of his talks). He is the propeller of the Hack & Beers community

Applications of cybercrime legal framework (III)

In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

Hardening binaries (IV) – VTV

In the previous post of this series we discussed how Google had included Asan in GCC to detect memory corruption errors. Virtual-Table Verification (VTV) is another option of GCC (> 4.9) developed by Google to try to prevent attacks that

Categories