Ricardo Martin – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Legal framework of impersonation (IV) http://s3lab.deusto.es/legal-framework-impersonation-4/ Fri, 16 Jun 2017 09:57:55 +0000 http://s3lab.deusto.es/?p=9180 Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to

The post Legal framework of impersonation (IV) appeared first on S3lab.

]]>
Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to define and define the consequences of criminal obligations, which are coupled to such behaviors.

The post Legal framework of impersonation (IV) appeared first on S3lab.

]]>
Legal framework of impersonation (III) http://s3lab.deusto.es/legal-framework-impersonation-3/ Sat, 06 May 2017 19:23:05 +0000 http://s3lab.deusto.es/?p=9066 Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense

The post Legal framework of impersonation (III) appeared first on S3lab.

]]>
Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense Indicated that as previously indicated are found in a habitual way through these criminal types previously indicated:

The post Legal framework of impersonation (III) appeared first on S3lab.

]]>
Legal framework of impersonation (II) http://s3lab.deusto.es/legal-framework-impersonation-2/ Thu, 02 Mar 2017 13:29:24 +0000 http://s3lab.deusto.es/?p=8940 To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has

The post Legal framework of impersonation (II) appeared first on S3lab.

]]>
To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has fit in the type collected in the article 248 LO Penal Code 10/1995 of 23 November.

The post Legal framework of impersonation (II) appeared first on S3lab.

]]>
Legal framework of impersonation (I) http://s3lab.deusto.es/legal-framework-impersonation-1/ Thu, 19 Jan 2017 10:57:32 +0000 http://s3lab.deusto.es/?p=8788 There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1

The post Legal framework of impersonation (I) appeared first on S3lab.

]]>
There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1 of Title XII, Chapter VI, Section 1 of the same that regulates the scams. More specifically, its article 248.1 establishes the requirements to consider the existence of a crime of fraud:

The post Legal framework of impersonation (I) appeared first on S3lab.

]]>
Applications of cybercrime legal framework (IV) http://s3lab.deusto.es/applications-cybercrime-legal-4/ Fri, 16 Dec 2016 10:57:35 +0000 http://s3lab.deusto.es/?p=8717 The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since

The post Applications of cybercrime legal framework (IV) appeared first on S3lab.

]]>
The stalking offense is born to give a punishable legal response to those behaviors that, although they have no legal reserve in the criminal type of harassment or threat, but nonetheless, are completely illegitimate behaviors, in In any case, since it results in an infringement and impairment of the right to freedom regulated under Article 14 of the EC within the “Fundamental Rights of Persons” chapter,

The post Applications of cybercrime legal framework (IV) appeared first on S3lab.

]]>
Applications of cybercrime legal framework (III) http://s3lab.deusto.es/applications-cybercrime-legal-3/ Sat, 05 Nov 2016 18:10:27 +0000 http://s3lab.deusto.es/?p=8604 In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August

The post Applications of cybercrime legal framework (III) appeared first on S3lab.

]]>
In this post we will summarize the resolution 238/2014 of the criminal court No. 4 Alcalá de Henares where the Prosecutor launches the accusation in the following terms:Discovery of secrets (article 197-2 of the Criminal Code.)Between 17 and 28 August which was operating this website, 70,000 users downloaded the virus and Trojan program. Hard disk of the accused Serial No. 3HR19EA9

The post Applications of cybercrime legal framework (III) appeared first on S3lab.

]]>