Mind Hacking, the magic of social engineering

Many of you may be wondering what exactly is this type of attack, discover two of the most used techniques of social engineering (Traditional SE and Reverse SE). At the beginning of the last decade, an interesting film based on the novel titled Takedown appeared

All your data are belong to us

Why I think we need to bring back the user to the security and privacy scenario Every nerd who is reading this piece of my mind is probably thinking: “Man! That’s a cool reference to the hilaros bad translation of

Bug bounty, hackers hunting for rewards

All started in 2004 when Mozilla decided to change the rules of the game and launched a rewards program for those who detected bugs (software errors) in their browser. But it wasn’t until 2010 that Google decided to pull the

My wireless network is the most secure in the world

Although you think your wireless network is the most secure in the world, I am sorry to disappoint you but it’s pretty unlikely. If you follow security guidelines, congratulations , you are among the select group of people who pay

I think that the fridge and toaster have a virus

Internet of things (IOT) and ambient intelligence are terms heard much lately. Are these devices free of virus? The problem is that in the same way you connect your new smartwatch with the refrigerator to alert you that you have