Although controlling the executables receives either in an email or through a download is good, we must not forget that the forest is full of foxes. Simply opening a Word or PDF document, for example, harmless at first sight, we…
Although controlling the executables receives either in an email or through a download is good, we must not forget that the forest is full of foxes. Simply opening a Word or PDF document, for example, harmless at first sight, we…
In recent days we have seen the enormous hype because of tweets published four years ago. The worst of all, it seems to have sparked a fad of “social archeology”, looking for that tweet or expression that might cause embarrassment.…
We return with a new article on WEKA. Following the introduction on how to prepare the environment and how use some basic functions, and the second part in which we tried to dig a little deeper into this tool, now it…
When installing Linux for the first time we do not think that there may be more of a command interpreter for the Linux console, and we leave Bash changing colors and little more. This time we will talk about zsh, one…
From May 18 to 20 we could enjoy at the Fairmont hotel in San Jose, California, with one of the 3 most important scientific events in computer security: the IEEE Symposium on Security and Privacy 2015 (Oakland 2015). In its 36th…
As time passes, we are realizing that everything we have done in the past marks one way or another the future. The same is what is happening today with secure Internet connections, called HTTPS. In the last week a new…