Applications of cybercrime legal framework (III)

In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

Hardening binaries (IV) – VTV

In the previous post of this series we discussed how Google had included Asan in GCC to detect memory corruption errors. Virtual-Table Verification (VTV) is another option of GCC (> 4.9) developed by Google to try to prevent attacks that

Portable experiments (I) – VMs with Vagrant

All programmer or researcher need to create development environments or experiments. It is highly desirable that this environments are portable and easily reproducible. The use of virtual machines and / or containers can offer this. There are several tools that

Security Research (VI) – Papers, Structure

After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

Backdoors, I don’t remember opening that door

Although many people have never heard of them, backdoors are one of the most frequently methods used nowadays to perform malicious attacks. Leaving aside the specific case of the backdoors in cryptographic algorithms, backdoors allows access to a particular computer

It’s time to vote

Once again the prestigious annual Bitacoras Awards voting start. Last year we had the honor of being ranked 23rd in the category of best computer security blog, above many reference blogs. The truth is that this encouraged us to continue even with