Interview with David Barroso (@lostinsecurity)

With over 15 years dedicated to information security, David Barroso (@lostinsecurity) has become one of the most important references in the sector. As he likes to say, “Not one day goes by that I don’t ride, ’til the infinite, the horse of

Privacy and network operators (Vodafone)

Changes in the privacy of social networks or movements of the great “players” of the Internet in this area usually watched very closely. However, there are other vital partners in the development of the information society: the network operators. The owners

WEKA, from data to information (Part I)

We start with the basics, installation and familiarization with the tool, and a simple example to see its possibilities. First, we download WEKA from the website of the University of Waikato in New Zealand. Within its download section, find the version

A smartphone behind the peephole

Our phones know where we walk, which are our friends, when do we go shopping, etc. The worst part, is that they don’t do it just for knowledge, they do it with one goal in mind, money. And who do you think that gives

Immersed in the Deep Web, hidden networks in sight

The network of networks hosts a lot of information that is separated into different layers, which allow to control the accessibility of the data stored there. Generally, it is called Deep Web to any page that is not indexed by

Starting as data scientist

Terabytes of data stored everywhere, in various places, to everyone. Which is the reason of it, if we don’t use them for anything? Let’s start analysing.  You can predict the future with them and  understand  situations that happened long ago, it’s