Mind Hacking, the magic of social engineering

Many of you may be wondering what exactly is this type of attack, discover two of the most used techniques of social engineering (Traditional SE and Reverse SE). At the beginning of the last decade, an interesting film based on the novel titled Takedown appeared

Aitor Santamaría Ibirika, DeustoTech Computing researcher, new Ph. D.

“The researcher of DeustoTech Computing Aitor Santamaría Ibirika has defended his doctoral thesis on 24th October in the Salon de Grados at the University of Deusto. He obtained the International Mention and Excelent cum laude qualification.” Aitor Santamaría Ibirika, researcher

Jorge de la Peña Sordo, DeustoTech Computing research assistant, new Ph. D.

“Jorge de la Peña Sordo, DeustoTech Computing research assistant, has defended his doctoral thesis on 24th October in the Salon de Grados at the University of Deusto, obtaining the highest qualification with Cum Laude Mention and an International Mention.” Jorge

Interview with Joxean Koret (@matalaz)

Joxean Koret in one sentence: I analyse, break and code stuff in no specific order. Great  security researcher / auditor and  better person. He tells his story, his opinions and some anecdotes about information security. If you want to keep abreast of where he

All your data are belong to us

Why I think we need to bring back the user to the security and privacy scenario Every nerd who is reading this piece of my mind is probably thinking: “Man! That’s a cool reference to the hilaros bad translation of

Bug bounty, hackers hunting for rewards

All started in 2004 when Mozilla decided to change the rules of the game and launched a rewards program for those who detected bugs (software errors) in their browser. But it wasn’t until 2010 that Google decided to pull the