General security

Best Security Podcasts

One of the most important aspects of security is staying up to date with trends, best practices and current events. News sites and Twitter are great ways to

Breaking Software Protection – DSA/DSS

1. Introduction In this third part of the series, we will see something similar to the second article but a little bit more advanced. This article will cover

Cyber Warfare and Cyber Weapons, a Real and Growing Threat

Numerous malicious attacks on computers and mobile devices as well as networks of important entities have recently made the news and have brought back to the

Cyber Terrorism: Complexities and Consequences

While a terrorist using the Internet to bring down the critical infrastructures the United States relies on makes an outstanding Hollywood plot, there are fl

Breaking Software Protection: ElGamal Signature Scheme

Introduction In today's article, we will see a more advanced cryptosystem than the previous one: the ElGamal Signature scheme (not to be confused with ElGama

Cyber-Terrorism: Complexity and Strategy

The Internet has fundamentally altered the world we live in and interact. As former Secretary of Defense Leon Panetta (2012) remarked in a speech before the

Introduction to RFID Security

1. Introduction Radio Frequency Identification, also known as RFID, is a technology that was created by Léon Theremin in1945 and later patented by Mario Card

Security Predictions for 2015

2014 has been a very interesting year with some really big data breaches on companies like Sony, eBay, Dominos and widespread software vulnerabilities like S

2015 Security Predictions: The Rise of Hacking Campaigns

Introduction With just a few days until the end of 2014, it's time to analyze what's happened in the last twelve months. I would like to analyze with you the

Cloud VPN Security Recommendations

Introduction A VPN (Virtual Private Network) enables connections between clients and servers from multiple different internal networks across a public networ