Impersonation – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Legal framework of impersonation (IV) http://s3lab.deusto.es/legal-framework-impersonation-4/ Fri, 16 Jun 2017 09:57:55 +0000 http://s3lab.deusto.es/?p=9180 Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to

The post Legal framework of impersonation (IV) appeared first on S3lab.

]]>
Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to define and define the consequences of criminal obligations, which are coupled to such behaviors.

The post Legal framework of impersonation (IV) appeared first on S3lab.

]]>
Legal framework of impersonation (III) http://s3lab.deusto.es/legal-framework-impersonation-3/ Sat, 06 May 2017 19:23:05 +0000 http://s3lab.deusto.es/?p=9066 Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense

The post Legal framework of impersonation (III) appeared first on S3lab.

]]>
Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense Indicated that as previously indicated are found in a habitual way through these criminal types previously indicated:

The post Legal framework of impersonation (III) appeared first on S3lab.

]]>
Legal framework of impersonation (II) http://s3lab.deusto.es/legal-framework-impersonation-2/ Thu, 02 Mar 2017 13:29:24 +0000 http://s3lab.deusto.es/?p=8940 To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has

The post Legal framework of impersonation (II) appeared first on S3lab.

]]>
To continue with the list of the most habitual behaviors that can lead to criminal offense, and continuing in the line of Phishing and Farming, as third variety we must not fail to include the following behavior that also has fit in the type collected in the article 248 LO Penal Code 10/1995 of 23 November.

The post Legal framework of impersonation (II) appeared first on S3lab.

]]>
Legal framework of impersonation (I) http://s3lab.deusto.es/legal-framework-impersonation-1/ Thu, 19 Jan 2017 10:57:32 +0000 http://s3lab.deusto.es/?p=8788 There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1

The post Legal framework of impersonation (I) appeared first on S3lab.

]]>
There are now several practices related to The impersonation by computer means that have been classified as criminal behavior in the current criminal code 10/1995 specifically all of them will be related to the criminal type included in article 248.1 of Title XII, Chapter VI, Section 1 of the same that regulates the scams. More specifically, its article 248.1 establishes the requirements to consider the existence of a crime of fraud:

The post Legal framework of impersonation (I) appeared first on S3lab.

]]>