Alice and Bob, their story

--Originally published at tc2027 – Ce qui est chouette

The brief description provided by Coursera‘s Cyptography I course by the University of Stanford paints cryptography as a tool for protecting information in computer systems. What I’ll attempt to cover in this post is cryptography’s real-world application, why it is needed.

First let’s deal with some basic stuff regarding cryptography, starting with the classic Alice, Bob and that bastard Eve who’s always meddling, she’s more of a Lilith if you asked me. Let’s say Alice has the sudden urge to communicate some secret message to Bob, perhaps she’s going to confess her love, but Eve also likes Bob, and Alice knows this. She can’t met Bob in person, Eve would find out, she lives close by and would get in the way. THANK GOD for the cryptography course Bob and Alice took years ago, where they learned about symmetric and asymmetric cryptography . . .


Secured! by Sean T. Evans on Flickr under a CC License.

Sidenote to Explain Asymmetric and Symmetric Cryptography

Based on this post on Synopsys. Encryption uses an algorithm and a key to turn plaintext, the message, into ciphertext, the encrypted message that you can then send. Symmetric Encryption uses the same key for both encryption and decryption of a message, its fast and can be used  for large amounts of data, like encrypting a hard drive, the hard part is keeping that key secured. Asymmetric encryption keeps a pair of keys, a private one and a public one, that can be distributed anywhere to interact with your messages. Plaintext encrypted with a private key can only be decrypted by its corresponding public counterpart, and vice versa. A message can also be signed using your private key, so that others may decrypt the signature with your public key and verify it Continue reading "Alice and Bob, their story"

Vehicle cybersecurity

--Originally published at Security – Hermes's Blog

Resultado de imagen para tesla hacked

Today’s behicles feature driver assistance, like collision warning, automatic emergency braking and safety vehicle communications. The NHTSA (National Highway Traffic Security Administration) is exploring the full spectrum of its tools to ensure these technologies are deployed safely and effectively. It encourages the implementation of NIST Cybersecurity Framework. NHTSA promotes a multi-layered approach to cybersecurity by focusing on a vehicle’s entry points, both wireless and wired.

Malicious exploitation of security vulnerabilities in connected cars is a major problem, with news stories of hacking interfering with consumer acceptance of the current and future capabilities of vehicles.

The first well known security compromise of a smart vehicle, a 2014 Jeep Cherokee was hacked by security reserchers Charlie Miller and Chris Valasek in 2015, they were able to turn the steering wheel, disable the brakes and shut the engine down, all remotely. They also discovered that they could access thousands of other vehicles that were using the Uconnect entertainment and navigation system, common in Dodge, Jeep and chrysler vehicles.

It is good to know that automotive manufacturers and transportation compaines are well informed about these problems and are taking it very seriously, hiring cybersecurity experts as part of a concerted auto industry effort to greatly increase the strength of security features in cars.



--Originally published at Information Security Class

Cryptography involves creating written or generated codes that allow information to be kept secret. Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format, thus compromising the data.

Information security uses cryptography on several levels. The information cannot be read without a key to decrypt it. The information maintains its integrity during transit and while being stored. Cryptography also aids in nonrepudiation. This means that the sender and the delivery of a message can be verified.

Operating System Security

--Originally published at Information Security Class

Many attacks are silent and invisible. What good is an attack if the victim can see and perhaps counter it? As I described in my last post, viruses, Trojan horses, and similar forms of malicious code may masquerade as harmless programs or attach themselves to other legitimate programs. Nevertheless, the malicious code files are stored somewhere, usually on disk or in memory, and their structure can be detected with programs that recognize patterns or behavior. A powerful defense against such malicious code is prevention to block the malware before it can be stored in memory or on disk.

The operating system is the first line of defense against all sorts of unwanted behavior. It protects one user from another, ensures that critical areas of memory or storage are not overwritten by unauthorized processes, performs identification and authentication of people and remote operations, and ensures fair sharing of critical hardware resources. As the powerful traffic cop of a computing system it is also a tempting target for attack because the prize for successfully compromising the operating system is complete control over the machine and all its components.

Because of its fundamental position in a computing system, an operating system cannot be weak. The strength of an operating system comes from its tight integration with hardware, its simple design, and its focus intentionally or not on security. Of course, an operating system has the advantage of being self-contained on a distinct platform.


--Originally published at Information Security Class

Malware, a shortened combination of the words malicious and software, is a term for any sort of software designed with malicious intent. That malicious intent is often theft of your information or the creation of a backdoor to your computer so someone can gain access to it without your permission. However, software that does anything that it didn’t tell you it was going to do could be considered malware.

What are Common Types of Malware?

  • Virus: Infects program files and/or personal files
  • Spyware: Software that collects personal information
  • Worm: Malware that can replicate itself across a network
  • Trojan horse: Malware that looks, and may even operate, as a legitimate program
  • Browser hijacker: Software that modifies your web browser
  • Rootkit: Software that gains administrative rights for malicious intent
  • Malvertising: The use of legitimate online advertising to spread malicious software.

There are other types of programs, or parts of programs, that could be considered malicious due to the simple fact that they carry a malicious agenda, but the ones listed above are so common that they get their own categories.

How Does a Malware Infection Happen?

Malware can infect a computer or other device in a number of ways. It usually happens completely by accident, thhe most common is by downloading software that is bundled with a malicious application. Some malware can get on your computer by taking advantage of security vulnerabilities in your operating system and software programs. Outdated versions of browsers, and often their add-ons or plug-ins as well, are easy targets.

Another common source of malware is via software downloads that at first seem to be something safe like a simple image, video, or audio file, but in reality is a harmful executable file that installs the malicious program.

How Do You Remove Malware?

The most common types of malware are actual programs like Continue reading "Malware"


--Originally published at Lord Security

Most of mobiles Malware do relatively simple stuff, stealing data, mining cryptocurrency or encrypting files, but some months ago a very sophisticated one was discorevered, Skygofree.


Some of the functions that make Skygofree terrifying are:

  • It can turn on the microphone for audio recording when the device is in a determined location
  • It can connect to networks controlled by the hackers, even with Wi-Fi disabled on the device, giving access to all the user’s traffic (passwords, credit cards, sites visited).
  • The stealing of WhatsApp messages via Accessibility Services
  • Secretly turning on the front-facing camera and take photos or videos

The main way on infection is through fake Mobile operators pages, where the user downloads an “update” and get infected. Once on the Phone, it shows a progress bar while waiting for instructions on what to do from the attackers.

The virus also has a way to protect itself, it can show a fake notification to prevent killing the background services it use.

Skygofree uses exploits to get the root privileges by looking for the device in a database of mobiles, to adjust itself on what it is attacking and exploiting its vulnerabilities.


So far Skygofree has only been seing on some parts of Italy, however, due to all the damage it can cause it is better to be prevented by only downloading apps from official sources and disabling installation of third-party apps.


Let others mine for you

--Originally published at Lord Security

Why bothering in using your own resources, GPU, CPU, etc. zxcon mining cryptocoins when you can trick others to make it for you? That’s what the people who use Coinhive think.

According to Krebs, “Coinhive is a cryptocurrency mining service that relies on a small chunk of computer code designed to be installed on Web sites. The code uses some or all of the computing power of any browser that visits the site in question, enlisting the machine in a bid to mine bits of the Monero cryptocurrency.”

zcvThat means that when someone visits site with Coinhive on it part of the resources from the device the user is using to browse the page will be used to mine for the person who put the code there.


Even though Bitcoin is the most famous cryptocurrency, Coinhive uses Monero for a good reason, it has a better privacy than Bitcoin. It is virtually untraceable, without a way others besides the parts of the transaction can track it. Their transactions  automatically have privacy features applied. You never have to request and then verify whether other people have enabled a privacy mechanism when sending you funds.


The most common use of Coinhive is adding directly on the page, without the administrators permission many times, a part of code in the <head> </head>  tags. With that and adding your public key for all the the Moneros you earn you are ready to let others do the mining


For more information on setting Coinhive and all of its uses you can check the documentation at




¿Somos Víctimas?

--Originally published at A work in progress

El otro día estaba en mi clase de Ciudadanía cuando empezaron a hablar del tema de las redes sociales en la política, la verdad es que en mi clase somos muy pocos los ingenieros en sistemas, que poseemos un poco más de conocimiento sobre el tema tecnológico, sin embargo algunos Licenciados empezaron a externar su opinión diciendo los siguientes supuestos.

"El internet controla todo"

Yo no estuve de acuerdo con esta oración dado que el internet controla lo que dejamos que controle. ¿Me explico? Si no tienes instalado activado el firewall en tu laptop, ni posees un buen antivirus o mínimo alguna extensión de seguridad y te la vives en sitios de internet tipo PopcornTime, Cuevana etc bueno, evidentemente hay alguien filtrando los datos de tu computadora, mas no controlando que es una gran diferencia.

También si en nuestras redes sociales se nos presentan noticias que , si hubieramos leído con mayor detenimiento, sabríamos que son falsas antes de compartirlas. Pero la realidad es que somos personas muy comodas, muy pasivas en cuanto a lo que sucede a nuestro alrededor. No nos gusta investigar, no nos gusta educarnos a nosotros mismos, y de eso no tiene la culpa el internet.

"Mi celular sabe todo de mí"

La verdad con esta oración si me reí un poco para mis adentros, independientemente de la carrera que estudien o del conocimiento que posean en cualquier campo se me hace un razonamiento muy ignorante pensar esto. ¿Enserio vamos por la vida creyendo que nuestro celular aprende de nosotros? Pero así nomás, nos dan nuestro aparato y solito aprende... claro que no. Y yo intenté explicar que nosotros dejamos que nuestros aparatos aprendan de nosotros. Pero me parace muy inaudito que pasemos bastantes horas de nuestro día interactuando con nuestro aparatos y no sepamos que Continue reading "¿Somos Víctimas?"

Cyber Troops

--Originally published at A work in progress

Las "Cyber Troops" son tipos de tecnologías usadas para manipular el pensamiento de las personas a través de las redes sociales, o para inclinarlas hacia cierto tipo de.
Existen tres tipos:
  • Boots: estos son programados, es decir no poseen algún tipo de inteligencia para realizar alguna acción, simplemente las hacen.
  • Cyborgs: son bots, pero controlados por un humano
  • Humans: personas reales a las que se les paga por hacer publicaciones.

 Los gobiernos de alrededor del mundo estan analizando a estos "Cyber troops", ya que estos manipulan redes sociales tales como Facebook y Twitter.  Donde comparten información irreal junto con criticas hacia personas y/o partidos políticos.

¿Cómo funcionan?

Para esta parte necesito que si estas leyendo seas crítico y te pongas a pensar en los últimos trending topics que has visto, así como los videos que has compartido en Facebook. Cada día que emerge un nuevo video "gracioso" o "violento" tiene una razón de ser, generalmente cuando surgen este tipo de tomas son para desviarnos de algo más importante.

¿México los usa?

De acuerdo con un estudio hecho por la Universidad de Oxford en el 2017, en el cual se analizaron 24 países, incluyendo a nuestro querido México. Cabe recalcar que Peña Nieto se ha deslindado numersoas veces de tener relación con este tipo de tecnologías sin embargo este estudio demuestra todo lo contrario. En dicho estudio se ha desmotrado como el gobierno ha hecho uso de discursos de odio, acoso verbal, posicionamiento de notas falsas, uso de influenciadores web en contra de sus adversarios.

Lo maravilloso de usar este tipo de tecnologías es que generalmente son contratadas de manera externa, esto hace más dificil su identificación y la vinculación con sus contratantes.

La especialista de Oxford recalca lo siguiente del estudio.
"No creo que la gente se dé Continue reading "Cyber Troops"