-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Category Archives: Security
Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum
Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. The Davos Forum organized by the … Continue reading
Posted in Hacking Etico, RF, Security
Tagged attack vector, Computer Network Operations (CNO), Information Warfare, Intelligence
Leave a comment
Modern Wardriving
Let’s start by defining the word Wardriving: it is the search for WIFI wireless networks from a vehicle equipped with a computer. This would be the classic definition. I define modern wardriving as the search for WIFI networks, Bluetooth devices … Continue reading
Posted in Hacking Etico, RADIO, RF, Security, Technology, Wireless
Tagged Bluetooth, GSM, Penetration Testing, RF, Wardriving, WIFI, wireless
Leave a comment
Information Warfare Strategies (SRF-IWS): Unveiling the Risks: Paris Protests and the potential to compromise the cybersecurity of companies while looting their stores
Introduction The world has witnessed countless protests throughout history, as people express their grievances and demand change. Paris, known for its passionate demonstrations, has experienced its fair share of protests in recent times. Other places such as Barcelona (September 2022) … Continue reading
Posted in Economics, Pentest, Security, Technology
Tagged attack vector, CyberSecurity, Information Warfare, red team
Leave a comment
Infrared Dominance with Flipper Zero
Flipper Zero is a portable and powerful multi-tool for hackers, security professionals or geeks. It was extremely well received when it was first launched on Kickstarter in 2020. I received my Flipper Zero in July 2021 and it’s time to … Continue reading
Posted in Hacking Etico, Pentest, RF, Security, Technology, Wireless
Tagged FlipperZero, hacker, Infrared, radio, Radio Frequency
Leave a comment
Offensive Security Wireless Professional (OSWP): my experience
On July 24, 2022 I took the well-known Offensive Security Wireless Professional (OSWP) practical exam and although Offensive Security can take days to inform of the result of the exam (pass/fail), the next day on July 25 they informed me … Continue reading
KringleCon / Holiday Hack 2021 Writeup
Another SANS Holiday Hack Challenge & Kringle (2021) CTF done. Please find my writeup for this awesome & fun CTF. I will continue to work on the few missing challenges so expect updates ASAP. PDF MD5: 51bc75a10e1de548de2adef974a36201 Report Download Enjoy … Continue reading
Posted in Security, Technology
Tagged Application Security, CTF, hacker, Penetration Testing, Software Security
Leave a comment
Cool podcasts on cyber security, red team, and startups (1)
Here you will find some of the cool podcasts that I have been listening lately on topics like cybersecurity, red team, hacking, artificial intelligence (AI), and startups. Some in English and other in Spanish 🙂 You can listen to them … Continue reading
Posted in Podcast, Security, Technology
Tagged CyberSecurity, Hacking, Penetration Testing, Podcast, red team, startups
Leave a comment
The Ten Top Computer Science Papers You Must Read
Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan Turing (1950) COMPUTING MACHINERY AND INTELLIGENCE THOMAS J. McCABE (1976) A … Continue reading
Posted in Books, Business, Security, Technology
Tagged Book, Computer Science, CyberSecurity, Information Security, Software Security
Leave a comment
Hacker Entertainment for COVID-19 Times
We are facing an extraordinary and very serious situation, so it is necessary for the population to stay at home. Fortunately we live in the information age and many of us hackers are used to being locked up at home … Continue reading
Posted in Pentest, Security, Technology, Uncategorized
Tagged COVID-19, COVID19, hacker, Hacking, Information Security, Penetration Testing
Leave a comment
October, European Cyber Security Month 2018: Success or Failure?
Last October was the European Cyber Security Month 2018, an campaign aiming at increasing cyber security awareness across EU citizens promoted by ENISA (European Union Agency for Network and Information Security), each October for the last 5 years. Kudos ENISA. … Continue reading
Posted in Privacy, Security, Technology, Uncategorized
Tagged Breach, CyberSecurity, Information Security, Leak
Leave a comment