Paralelo90
paralelo90.bsky.social
Paralelo90
@paralelo90.bsky.social
Lector, interesado últimamente en la ciberseguridad.
Reposted by Paralelo90
En los últimos meses, frente a un Bukele cada vez más intolerante, han salido del país 53 periodistas de medios independientes, 25 de ellos de El Faro.

www.jornada.com.mx/noticia/2025...
Con Bukele, 53 periodistas salieron al exilio en unos meses
El periodista y casi todos sus colegas tuvieron que salir de El Salvador.
www.jornada.com.mx
November 21, 2025 at 12:41 AM
Sí, a algunos hombres nos cuesta hacer algunas cosas y por eso nos complicamos 😆 #Comics #Zits
November 18, 2025 at 5:32 PM
Nunca le he podido entrar al LaTex para las fórmulas. Una vez intenté, pero me di cuenta de que otras personas que tocaran el documento les iba a costar también. Ni modo.
November 18, 2025 at 5:30 PM
Reposted by Paralelo90
Blog: "Hackean la compañía aérea Iberia y venden 77GB datos privados internos"
Hackean la compañía aérea Iberia y venden 77GB datos privados internos
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
blog.elhacker.net
November 14, 2025 at 12:01 PM
Reposted by Paralelo90
Reposted by Paralelo90
Blog: "GlassWorm: un gusano se propaga a través de extensiones de Visual Studio Code"
GlassWorm: un gusano se propaga a través de extensiones de Visual Studio Code
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
blog.elhacker.net
October 31, 2025 at 11:30 AM
Reposted by Paralelo90
Blog: "Las copias de seguridad de WhatsApp añaden las passkeys"
Las copias de seguridad de WhatsApp añaden las passkeys
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
blog.elhacker.net
October 31, 2025 at 12:01 AM
Reposted by Paralelo90
Serious F5 Breach

This is bad: F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a "sophisticated" threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a "long-term." Security…
Serious F5 Breach
This is bad: F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a "sophisticated" threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a "long-term." Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network…
www.schneier.com
October 23, 2025 at 11:05 AM
Las partes interesantes de la #criptografía, las que recuerdan a las películas de espías.
Part Four of The Kryptos Sculpture

Two people found the solution. They used the power of research, not cryptanalysis, finding clues amongst the Sanborn papers at the Smithsonian's Archives of American Art. This comes as an awkward time, as Sanborn is auctioning off the solution. There were legal…
Part Four of The Kryptos Sculpture
Two people found the solution. They used the power of research, not cryptanalysis, finding clues amongst the Sanborn papers at the Smithsonian's Archives of American Art. This comes as an awkward time, as Sanborn is auctioning off the solution. There were legal threats -- I don't understand their basis -- and the solvers are not publishing their solution.
www.schneier.com
October 24, 2025 at 3:35 PM
Reposted by Paralelo90
Este vídeo iba para mis “amiguis” :)), ya que me preguntaban cómo funciona la IA generativa. Falta muchísimo detalle, y no hablo en detalle de la capa de los modelos, sino que hago un repaso muy general desde la capa del hardware hasta la capa de las aplicaciones youtu.be/Wq3yJ9ehqGM?...
Cómo funciona la IA generativa - Una perspectiva muy general (Big picture)
YouTube video by Manuela Battaglini Manrique de Lara
youtu.be
October 13, 2025 at 7:26 AM
Reposted by Paralelo90
Para desintoxicarse un poco de tan tremendo espanto.
Mosaico “les nageuses”, de Clotilde Ponroy, de Suzanne Manufacture ( www.instagram.com/suzannemanuf...).
October 7, 2025 at 1:28 AM
Reposted by Paralelo90
Happy Amazon Prime Day! Amazon collects mountains of data about how you use the service, but there is a setting you can change to make it harder for the company to use that data to sell you more things. #OptOutOctober www.eff.org/deeplinks/2...
October 7, 2025 at 4:39 PM
Reposted by Paralelo90
¿Cuál es la huella ecológica que deja la impresión y distribución de un libro? ¿Hay maneras de aminoras o solventar el problema? Hablo de ello en mi columna "La huella oscura de los libros".
La huella oscura de los libros
Hace un par de semanas hablaba en este espacio sobre las bibliotecas personales. No cabe duda que tener una, además de reflejar los gustos y preocupaciones intelectuales de sus dueños, implica una labor acumulativa. Pero detrás de nuestra compra de libros también hay otras reflexiones, nada literarias, a tomar en cuenta. Si juntáramos todos los libros que tenemos y sumáramos su valor en moneda, estoy segura de que nos sorprenderíamos del valor total de la inversión hecha.
jescudos.com
October 6, 2025 at 2:38 PM
Reposted by Paralelo90
Blog: "Vulnerabilidad de secuestro de DLL de Notepad++"
Vulnerabilidad de secuestro de DLL de Notepad++
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
blog.elhacker.net
September 30, 2025 at 3:01 PM
Reposted by Paralelo90
Literally and figuratively an information armaggedon: information integrity is the mother of all battles. Win this, and we can win the rest. Lose this, and we lose everything. (discussed the choice between armaggedon and apocalypse with Jon Stewart Thursday)
"This is the deadliest period for journalists in recorded history. More than 240 journalists killed in Gaza alone," journalist @mariaressa.bsky.social said at the UN. "They are targeted and there must be accountability," Ressa added at a meeting marking the United Nation's 80th anniversary.
September 22, 2025 at 6:21 PM
Hay tantos políticos que creen que el sol gira alrededor de su ombligo 😫. No importas en qué país leas esto.
September 17, 2025 at 3:42 PM
¿Será cierto que ellas son más minuciosas en esto? 😜
September 17, 2025 at 3:34 PM
Reposted by Paralelo90
Judith Torrea (antigua alumna de Fcom/Unav) en Pamplona sobre el ejercicio del periodismo en contextos violentos: «proteger y protegerse es la clave».

www.ondacero.es/emisoras/nav...

efe.com/navarra/2025...
Client Challenge
www.ondacero.es
September 11, 2025 at 8:01 AM
Reposted by Paralelo90
Las vacantes de hoy día.
September 4, 2025 at 2:22 PM
Reposted by Paralelo90
1965 Cryptanalysis Training Workbook Released by the NSA

In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros D. Callimahos coined the term "Stethoscope" to describe a diagnostic computer program used to unravel the internal structure of pre-computer…
1965 Cryptanalysis Training Workbook Released by the NSA
In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros D. Callimahos coined the term "Stethoscope" to describe a diagnostic computer program used to unravel the internal structure of pre-computer ciphertexts. The term appears in the newly declassified September 1965 document Cryptanalytic Diagnosis with the Aid of a Computer, which compiled 147 listings from this tool for Callimahos's…
www.schneier.com
September 2, 2025 at 11:09 AM
Reposted by Paralelo90
Zero-Day Exploit in WinRAR File

A zero-day vulnerability in WinRAR is being exploited by at least two Russian criminal groups: The vulnerability seemed to have super Windows powers. It abused alternate data streams, a Windows feature that allows different ways of representing the same file path.…
Zero-Day Exploit in WinRAR File
A zero-day vulnerability in WinRAR is being exploited by at least two Russian criminal groups: The vulnerability seemed to have super Windows powers. It abused alternate data streams, a Windows feature that allows different ways of representing the same file path. The exploit abused that feature to trigger a previously unknown path traversal flaw that caused WinRAR to plant malicious executables in attacker-chosen file paths %TEMP% and %LOCALAPPDATA%, which Windows normally makes off-limits because of their ability to execute code. More details in the article.
www.schneier.com
August 19, 2025 at 11:08 AM