Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some…
Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some…
Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some…
In this post we are going to talk about two options that can happen to the linker to make certain sections of our executable more secure: -Wl, -z, relro, -z, now. When a program calls a function not defined in…
Since ancient times, scam has been a practice carried out by scammers in order to gain a benefit (usually economic) through deception or social engineering techniques. The number of known campaigns is enormous and, unfortunately, increases as technology media advances.…
There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1…
The hiding of information in places that initially seem innocuous has been and is a widely used method. The biggest advantage of steganography is that sent messages can go completely unnoticed, since no one can think that they hide something…