Security Myths
The IT world is full of myths and legends circulated via email or simply spread by word of mouth. These legends are not the…
Non-OS-dependant malware
All too often people talk about the disadvantages of the Windows operating system: it has too many security flaws, it is not properly patched,…
New protection in the face of the new threats
Alfonso XI, ‘the Avenger’, was a Spanish king who once described in awe how during a battle against the Marinids, “they hurled many iron…
Forecast 2007
The problem with making a prediction about security in the year 2007 is that no matter how basic or extravagant it might be, it…
Viral convergence
Digital technology tried to solve these flaws, establishing an encryption system in the calls, which was easier because it was based on a digital…
Voice over IP under threat
There has recently been considerable alarm about the possibility of a malicious code spreading via Skype. Skype is a system that allows voice communication…
From software to fatware to nanosoftware
The first programmable electronic computer is considered the ENIAC, built as a general-purpose system (that is, capable of carrying out different tasks depending on…