Documents as or more malicious than executables

Although controlling the executables receives either in an email or through a download is good, we must not forget that the forest is full of foxes. Simply opening a Word or PDF document, for example, harmless at first sight, we

A fistful of tweets

In recent days we have seen the enormous hype because of tweets published four years ago. The worst of all, it seems to have sparked a fad of “social archeology”, looking for that tweet or expression that might cause embarrassment.

WEKA, from data to information (Part III)

We return with a new article on WEKA. Following the introduction on how to prepare the environment and how use some basic functions, and the second part in which we tried to dig a little deeper into this tool, now it

Surviving in the console (Part II)

When installing Linux for the first time we do not think that there may be more of a command interpreter for the Linux console, and we leave Bash changing colors and little more. This time we will talk about zsh, one

In IEEE Symposium on Security and Privacy 2015

From May 18 to 20 we could enjoy at the Fairmont hotel in San Jose, California, with one of the 3 most important scientific events in computer security: the IEEE Symposium on Security and Privacy 2015 (Oakland 2015). In its 36th

The past always comes back, Logjam

As time passes, we are realizing that everything we have done in the past marks one way or another the future. The same is what is happening today with secure Internet connections, called HTTPS. In the last week a new