That malware knows that they are watching it

It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they

Security Research (VIII) – Papers, Language

We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

console.log(blog 1095 days up)

Although it seems like we started yesterday , it’s been 3 years. We have learned a lot during this time, and we hope you too. Many thanks to all of you who have collaborated, and of course, to all the

Hardening binaries (VI) – Format Strings

Although vulnerabilities caused by improper use of format strings may not seem like a theme of the last century, a small search in the CVE database shows us that these errors are still happening. The danger of format string is given

Preventing scam nowadays

The types, thematic, or rather, the scam campaigns, have been evolving over time as well as their means of distribution. Nowaydays , among the most typical campaigns are, among others, those that make the victim believe that he has won (mysteriously)

Legal framework of impersonation (II)

To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has