Underground memories

Those, like me, who are old school people and lived the golden age of Spanish underground, we tend to miss those days when everything was much more fun than now. We used Windows 3.1  for groups work, we uprooted from

Information is power

Information. Does anyone doubt that having sufficient information is not half victory? The phrase “information is power”, was said for a reason. In Security, having the necessary information is vital to know where to move, which elements exist and which

Bitcoin, the digital currency that changes the rules

Cryptocurrencies are increasingly taking force. 5 years ago it was difficult to make any payment with them, but today it is quite a common practice. Although there are still people who directly associate them with ransomware payments (to decrypt infected computers)

Hardening binaries (I) – The stack

Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may

Cybercrime and legal framework (II)

In relation to Titulo X, we will focus on the new aspects of the recent reform of Lo 10/95 23 de noviembre (a number of criminal types arise).This article, keeps a wide connection with the spirit and purpose of the

Security Research (III) – General workplan

In previous posts of this series “Security research” have covered the selection of a theme and a director to be able to carry the doctoral thesis. This time we approach one of the most crucial aspects of the dissertation: the definition of the first workplan.