Applications of cybercrime legal framework (IV)

The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

Hardening binaries (V) – UBSan

The indefinite behavior in C / C ++ is caused when there are no restrictions on the program behavior; which means, when the standard does not specify what the implementation should do, it is free to do what it seems,

Portable experiments (II) – “Recipes” for VMs

In the previous post we talked about Vagrant, a tool that can help us manage the creation of virtual machines. In this post we will focus on another tool called Ansible. It is based on the concept of roles: on

Research in USA and in Spain

It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

An interview with Miguel A. Arroyo (@miguel_arroyo76)

Miguel is a very committed person with security, who tries to spread his passion to the greatest number of people (ratifiable by anyone who has attended one of his talks). He is the propeller of the Hack & Beers community

Applications of cybercrime legal framework (III)

In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

Hardening binaries (IV) – VTV

In the previous post of this series we discussed how Google had included Asan in GCC to detect memory corruption errors. Virtual-Table Verification (VTV) is another option of GCC (> 4.9) developed by Google to try to prevent attacks that

Portable experiments (I) – VMs with Vagrant

All programmer or researcher need to create development environments or experiments. It is highly desirable that this environments are portable and easily reproducible. The use of virtual machines and / or containers can offer this. There are several tools that

Security Research (VI) – Papers, Structure

After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

Backdoors, I don’t remember opening that door

Although many people have never heard of them, backdoors are one of the most frequently methods used nowadays to perform malicious attacks. Leaving aside the specific case of the backdoors in cryptographic algorithms, backdoors allows access to a particular computer

Categories