-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Category Archives: Security
OSINT + Python = Custom Hacking
Last May 10 and 11 the course of Computer Forensic Expert was held in Reus (Spain) by the Asociación Nacional de Tasadores y Peritos Judiciales Informáticos (ANTPJI), which I am member and one of the instructors, where I had the … Continue reading
AppSec: Improve your software security with GCC Stack Protector Strong
The other day helping out a client to develop secure software it came to my mind that this topic could be of interest to my readers. Obviously this topic is quite wide, but in this article I will focus in … Continue reading
Posted in Pentest, Privacy, Security, Technology, Threat Modeling
Tagged Application Security, AppSec @en, attack vector, Compiler, GCC, Information Security, Linux, SDL, Software Security
Leave a comment
Book Review: The IDA Pro Book, 2nd edition
If you like reverse engineering and want to learn all the secrets of IDA Pro, this is your book. This work written by Chris Eagle, a top expert on the subject, reveals the power of the best tool for reverse … Continue reading
Posted in Books, Pentest, Security, Technology
Tagged Application Security, Book, Book Review, RE, Reverse Engineering, Reversing, Software Security
Leave a comment
Back to Black Hat Europe and my talk on Anti-Theft
Last Thursday 14 and Friday 15 March the Conference Black Hat Europe was held in the great city of Amsterdam, a mandatory event for cyber security experts. For second year running I presented on R&D outlining the security posture of … Continue reading
Posted in Conference, Pentest, Security, Technology
Tagged Android, Anti-Theft, Application Security, Conference, CyberSecurity, Iphone, Penetration Testing, Software Security, VULNEX, Windows
Leave a comment
AppSec USA 2012: the experience
You know you are in Texas when you get out of the plane and hear country music through the airport and I was there indeed because the 25 and 26th of October the OWASP AppSec USA conference was taking place … Continue reading
Posted in Conference, Hacking, OWASP, Pentest, Privacy, SDL, Security, Technology, Threat Modeling
Tagged Application Security, Apps, Information Security, OWASP, SDL, Software Security, Web Honeypots
Leave a comment
Medre, AutoCAD Malware: The spy inside the cad
Last June a malware that infected AutoCAD for Windows was identified and is responsible for the theft of thousands of documents. AutoCAD is a popular program for 2D and 3D drawings that is used to design all kinds of products, … Continue reading
Posted in Pentest, Security
Tagged Android, APT, attack vector, Information Security, Intelligence, Iphone, malware, SCADA, virus, Worm
Leave a comment
“Find And Call” Smartphone Malware Analysis
[Español] La semana pasada Kaspersky publicó un artículo sobre un nuevo malware que afectaba a iPhone y Android, y esta App estaba disponible en sus mercados oficiales. Al ser el primer malware que aparece en el iPhone Market he pensado … Continue reading
Posted in Hacking, Security, Technology
Tagged Android, Apps, attack vector, Information Security, Iphone, malware, Smartphone, Software Security
Leave a comment
Network Intelligence Analysis
Analizar tráfico de red es realmente apasionante y para este post he pensado que sería un tema de interés para los lectores. El tráfico aquí analizado es más a modo de hobby cuando estoy en redes públicas/abiertas como hoteles, cafés … Continue reading