<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Yago Hansen CV</title>
	<atom:link href="https://yagohansen.com/author/yagohansen_8aizst/feed/" rel="self" type="application/rss+xml" />
	<link>https://yagohansen.com</link>
	<description>Yago Hansen Curriculum Vitae and background experience</description>
	<lastBuildDate>Tue, 10 Aug 2021 08:26:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.2</generator>

<image>
	<url>https://yagohansen.com/wp-content/uploads/2020/03/cropped-android-chrome-512x512-2-32x32.png</url>
	<title>Yago Hansen CV</title>
	<link>https://yagohansen.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Summer BootCamp 2021</title>
		<link>https://yagohansen.com/project/cybersbc2021/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 16:16:36 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=4955</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://yagohansen.com/project/cybersbc2021/">Cybersecurity Summer BootCamp 2021</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><style type="text/css" data-type="the7_shortcodes-inline-css">.shortcode-single-image-wrap.shortcode-single-image-fff7f763de41f572e0405e4cf78e06d8.enable-bg-rollover .rollover i,
.shortcode-single-image-wrap.shortcode-single-image-fff7f763de41f572e0405e4cf78e06d8.enable-bg-rollover .rollover-video i {
  background: -webkit-linear-gradient();
  background: linear-gradient();
}
.shortcode-single-image-wrap.shortcode-single-image-fff7f763de41f572e0405e4cf78e06d8 .rollover-icon {
  font-size: 32px;
  color: #ffffff;
  min-width: 44px;
  min-height: 44px;
  line-height: 44px;
  border-radius: 100px;
  border-style: solid;
  border-width: 0px;
}
.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-fff7f763de41f572e0405e4cf78e06d8 .rollover-icon {
  background: rgba(255,255,255,0.3);
  box-shadow: none;
}
</style><div class="shortcode-single-image-wrap shortcode-single-image-fff7f763de41f572e0405e4cf78e06d8 alignleft  vc_custom_1625772976993 enable-bg-rollover dt-icon-bg-off" ><div class="shortcode-single-image"><div class="fancy-media-wrap  layzr-bg" style=""><img class="preload-me lazy-load" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20876%20299&#39;%2F%3E" data-src="https://yagohansen.com/wp-content/uploads/cybersbc2021_bannerlanding_sp.jpg" data-srcset="https://yagohansen.com/wp-content/uploads/cybersbc2021_bannerlanding_sp.jpg 876w" width="876" height="299"  data-dt-location="https://yagohansen.com/project/cybersbc2021/cybersbc2021_bannerlanding_sp/" style="" alt="" /></div></div></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="standard-arrow bullet-top"><p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">The National Cybersecurity Institute (INCIBE) and the Organization of American States (OAS) annually organize the <a href="https://www.incibe.es/summer-bootcamp/sbc2021/programa/TF3">Cybersecurity Summer BootCamp</a>, an international training program specialized in cybersecurity aimed at Policy Makers, Security Forces and Bodies, the Public Prosecutor&#8217;s Office, Judges and Magistrates and</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="1">Cyber Incident Response Center Specialists.</span> </span></p>
<p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="3">This year 2021 the sixth edition of this event will take place, already consolidated as a unique event and of international reference, which is committed to offering cutting-edge training in cybersecurity.</span></span></p>
<p>&nbsp;</p>
<h1><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Forensic incident workshop:</span> </span></h1>
<h2><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="2">Real case of credit card skimmer in electronic commerce site<br />
</span></span></h2>
<div id="node-19545" class="node node-agenda-summer-bootcamp container-fluid container-no-gutter clearfix">
<div class="node-body">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p><strong><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Speaker</span></span></strong>: Yago Fernández Hansen</p>
<p><strong><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Theme:</span></span></strong> Digital Forensics and Incident Response (DFIR)</p>
<p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0"><strong>Category:</strong> Police investigation</span></span></p>
<p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0"><strong>Language:</strong> Spanish<br />
</span></span></p>
<div class="field field-name-field-agenda-fecha-sb field-type-taxonomy-term-reference field-label-above">
<p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0"><strong>Date:</strong> July 15, 2021</span></span></p>
</div>
<div class="field field-name-field-agenda-hora-sb field-type-datetime field-label-above">
<p><span class="date-display-single"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0"><strong>Time:</strong> 16:00</span></span></span></p>
</div>
<div class="field field-name-field-agenda-duracion-sb field-type-text field-label-above">
<p><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0"><strong>Duration:</strong> 3h</span></span></p>
<p>&nbsp;</p>
<h2><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Workshop index:</span></span></h2>
</div>
</div>
</div>
<div class="field-items">
<div class="field-item even">
<ul>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Presentation of the workshop.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="1">Summary of contents</span></span></li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="3">Download of the forensic tool by attendees</span></span></li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="5">Introduction to the actual incident.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="6">Credit card theft on a website</span></span></li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="8">Premises for performance</span></span></li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="10">Planning</span></span></li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="12">Obtaining information about the infrastructure</span></span></li>
<li>Hands on lab</li>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="16">Conclusions, requests and questions</span></span></li>
</ul>
<p>&nbsp;</p>
</div>
<h2 class="page-title" title="Actuación forénsica. Caso real de robo de tarjetas de crédito en comercio electrónico"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b C1N51c" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Workshop instructions:</span></span></h2>
<div id="node-19545" class="node node-agenda-summer-bootcamp container-fluid container-no-gutter clearfix">
<div class="node-body">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<ul>
<li><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">Download the following files and programs before the date of the workshop.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="1">Some are large and will require longer times for downloading and installing.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="2">Follow the instructions noted below each button.</span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div><style type="text/css" data-type="the7_shortcodes-inline-css">.shortcode-single-image-wrap.shortcode-single-image-2e260a6214a81641971018ccb2b780b3.enable-bg-rollover .rollover i,
.shortcode-single-image-wrap.shortcode-single-image-2e260a6214a81641971018ccb2b780b3.enable-bg-rollover .rollover-video i {
  background: -webkit-linear-gradient();
  background: linear-gradient();
}
.shortcode-single-image-wrap.shortcode-single-image-2e260a6214a81641971018ccb2b780b3 .rollover-icon {
  font-size: 32px;
  color: #ffffff;
  min-width: 44px;
  min-height: 44px;
  line-height: 44px;
  border-radius: 100px;
  border-style: solid;
  border-width: 0px;
}
.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-2e260a6214a81641971018ccb2b780b3 .rollover-icon {
  background: rgba(255,255,255,0.3);
  box-shadow: none;
}
</style><div class="shortcode-single-image-wrap shortcode-single-image-2e260a6214a81641971018ccb2b780b3 alignleft  vc_custom_1625834527836 enable-bg-rollover dt-icon-bg-off" ><div class="shortcode-single-image"><div class="fancy-media-wrap  layzr-bg" style=""><img class="preload-me lazy-load" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%201280%20719&#39;%2F%3E" data-src="https://yagohansen.com/wp-content/uploads/porttada-2-BOOTCAMP.png" data-srcset="https://yagohansen.com/wp-content/uploads/porttada-2-BOOTCAMP.png 1280w" width="1280" height="719"  data-dt-location="https://yagohansen.com/project/cybersbc2021/porttada-2-bootcamp/" style="" alt="" /></div></div></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class=" vc_custom_1626374099485 ubtn-ctn-center "><a class="ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-block " href="https://mega.nz/file/WcBXVSTL#EbD8dpIfvMSaS6kKsZT27bmqnS7fpsNc0pm_SDT798c" target="_blank" rel="noopener" ><button type="button" id="ubtn-7079"  class="ubtn ult-adjust-bottom-margin ult-responsive ubtn-block ubtn-left-bg  none  ubtn-sep-icon ubtn-sep-icon-at-left  ubtn-center   tooltip-622c0b1137f13 ubtn-block"  data-hover="" data-border-color="" data-bg="#e0e0e0" data-hover-bg="#c62605" data-border-hover="" data-shadow-hover="" data-shadow-click="none" data-shadow="" data-shd-shadow=""  data-ultimate-target='#ubtn-7079'  data-responsive-json-new='{"font-size":"","line-height":""}'  style="font-family:&#039;Fira Sans&#039;;font-weight:700;border:none;background: #e0e0e0;color: #000000;"><span class="ubtn-data ubtn-icon"><i class="Defaults-cloud-download" style="font-size:34px;color:;"></i></span><span class="ubtn-hover" style="background-color:#c62605"></span><span class="ubtn-data ubtn-text " >Download files for the Forensic_Get pendrive</span></button></a></div><div class=" vc_custom_1626112271686 ubtn-ctn-center "><a class="ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-block " href="https://hackinglabs.org/CyberSBC2021/forensiclinuxpendrive.zip" target="_blank" rel="noopener" ><button type="button" id="ubtn-5443"  class="ubtn ult-adjust-bottom-margin ult-responsive ubtn-block ubtn-left-bg  none  ubtn-sep-icon ubtn-sep-icon-at-left  ubtn-center   tooltip-622c0b1138013 ubtn-block"  data-hover="" data-border-color="" data-bg="#e0e0e0" data-hover-bg="#c62605" data-border-hover="" data-shadow-hover="" data-shadow-click="none" data-shadow="" data-shd-shadow=""  data-ultimate-target='#ubtn-5443'  data-responsive-json-new='{"font-size":"","line-height":""}'  style="font-family:&#039;Fira Sans&#039;;font-weight:700;border:none;background: #e0e0e0;color: #000000;"><span class="ubtn-data ubtn-icon"><i class="Defaults-cloud-download" style="font-size:34px;color:;"></i></span><span class="ubtn-hover" style="background-color:#c62605"></span><span class="ubtn-data ubtn-text " >Download files for the Forensic_Get pendrive (Alternative link)</span></button></a></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1625850018072" >
		<div class="wpb_wrapper">
			<p style="text-align: left;"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">* Download this compressed file in zip format.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="1">You will need a pendrive with at least 16 GB free space, formatted in EXT4 using Linux.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="2">Unzip the contents of the file onto the new formatted pendrive.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="3">If you don&#8217;t know how to do it, we&#8217;ll explain it during the workshop.</span></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class=" vc_custom_1626373921039 ubtn-ctn-center "><a class="ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-block " href="https://mega.nz/file/fNwlmSjA#mzWc4QY4Egdfi942xWqwf5u4bOCCYyh_2V7NZ600nNQ" target="_blank" rel="noopener" ><button type="button" id="ubtn-7981"  class="ubtn ult-adjust-bottom-margin ult-responsive ubtn-block ubtn-left-bg  none  ubtn-sep-icon ubtn-sep-icon-at-left  ubtn-center   tooltip-622c0b1138b1f ubtn-block"  data-hover="" data-border-color="" data-bg="#e0e0e0" data-hover-bg="#c62605" data-border-hover="" data-shadow-hover="" data-shadow-click="none" data-shadow="" data-shd-shadow=""  data-ultimate-target='#ubtn-7981'  data-responsive-json-new='{"font-size":"","line-height":""}'  style="font-family:&#039;Fira Sans&#039;;font-weight:700;border:none;background: #e0e0e0;color: #000000;"><span class="ubtn-data ubtn-icon"><i class="Defaults-cloud-download" style="font-size:34px;color:;"></i></span><span class="ubtn-hover" style="background-color:#c62605"></span><span class="ubtn-data ubtn-text " >Download LibreOffice Presentation</span></button></a></div><div class=" vc_custom_1626373978698 ubtn-ctn-center "><a class="ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-block " href="https://mega.nz/file/Hdh3BQ7R#VPsMCZ_wUAnLIu1z-IMTXTQXwHzFOFsX5gwYTU7UARw" target="_blank" rel="noopener" ><button type="button" id="ubtn-6192"  class="ubtn ult-adjust-bottom-margin ult-responsive ubtn-block ubtn-left-bg  none  ubtn-sep-icon ubtn-sep-icon-at-left  ubtn-center   tooltip-622c0b1138be1 ubtn-block"  data-hover="" data-border-color="" data-bg="#e0e0e0" data-hover-bg="#c62605" data-border-hover="" data-shadow-hover="" data-shadow-click="none" data-shadow="" data-shd-shadow=""  data-ultimate-target='#ubtn-6192'  data-responsive-json-new='{"font-size":"","line-height":""}'  style="font-family:&#039;Fira Sans&#039;;font-weight:700;border:none;background: #e0e0e0;color: #000000;"><span class="ubtn-data ubtn-icon"><i class="Defaults-cloud-download" style="font-size:34px;color:;"></i></span><span class="ubtn-hover" style="background-color:#c62605"></span><span class="ubtn-data ubtn-text " >Download Presentation PDF</span></button></a></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1626374067122" >
		<div class="wpb_wrapper">
			<p style="text-align: left;"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">* You can download the workshop presentation in either PDF or ODS format. There are instructions about the workshop steps to take.<br />
</span></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class=" vc_custom_1626112285317 ubtn-ctn-left "><a class="ubtn-link ult-adjust-bottom-margin ubtn-left ubtn-block " href="https://github.com/yadox666/Forensic_GET" target="_blank" rel="noopener" ><button type="button" id="ubtn-8168"  class="ubtn ult-adjust-bottom-margin ult-responsive ubtn-block ubtn-left-bg  none  ubtn-sep-icon ubtn-sep-icon-at-left  ubtn-left   tooltip-622c0b1139565 ubtn-block"  data-hover="" data-border-color="" data-bg="#e0e0e0" data-hover-bg="#c62605" data-border-hover="" data-shadow-hover="" data-shadow-click="none" data-shadow="" data-shd-shadow=""  data-ultimate-target='#ubtn-8168'  data-responsive-json-new='{"font-size":"","line-height":""}'  style="font-family:&#039;Fira Sans&#039;;font-weight:700;border:none;background: #e0e0e0;color: #000000;"><span class="ubtn-data ubtn-icon"><i class="fab fa-github" style="font-size:34px;color:;"></i></span><span class="ubtn-hover" style="background-color:#c62605"></span><span class="ubtn-data ubtn-text " >Forensic_Get project on github</span></button></a></div>
	<div class="wpb_text_column wpb_content_element  vc_custom_1625849324314" >
		<div class="wpb_wrapper">
			<p style="text-align: left;"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="0">* You do not need to download this script for the Lab, as it is included in the foreign USB stick.</span> <span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="es" data-phrase-index="1">You can open it at any time to check the documentation or download the latest version.</span></span></p>

		</div>
	</div>
</div></div></div></div>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/cybersbc2021/">Cybersecurity Summer BootCamp 2021</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Applelianos Community</title>
		<link>https://yagohansen.com/project/applelianos-community/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Thu, 16 Apr 2020 12:19:10 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=4572</guid>

					<description><![CDATA[<p>Second part published on &#8220;The Apple and Google Plan&#8221; this time with @yadox our friend and fellow expert in Cybersecurity together with our colleagues will help us understand how our privacy and data will be managed. Maybe we have opened the Pandora&#8217;s box or it is already open for a long time. We will tell&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/applelianos-community/">Applelianos Community</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large is-resized"><img src="https://yagohansen.com/wp-content/uploads/268x0w.png" alt="Applelianos logo" class="wp-image-4573" width="306" height="316"/><figcaption>Applelianos logo</figcaption></figure>



<p>Second part published on &#8220;The Apple and Google Plan&#8221; this time with @yadox our friend and fellow expert in Cybersecurity together with our colleagues will help us understand how our privacy and data will be managed. Maybe we have opened the Pandora&#8217;s box or it is already open for a long time. We will tell you our opinions and we will go further, thank Yago Hansen and Yago Jesus for collaborating on these two episodes. Now it&#8217;s up to you to play and share the episode. Greetings Applelians.</p>



<p><a href="https://applelianos.podbean.com/e/el-plan-de-apple-y-google-con-yadox-2-parte/" target="_blank" rel="noreferrer noopener">https://applelianos.podbean.com/e/el-plan-de-apple-y-google-con-yadox-2-parte/</a></p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/applelianos-community/">Applelianos Community</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mundo Hacker Radio Podcast</title>
		<link>https://yagohansen.com/mundo-hacker-radio-podcast/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 19:32:59 +0000</pubDate>
				<category><![CDATA[mundohacker-en]]></category>
		<category><![CDATA[ciberseguridad]]></category>
		<category><![CDATA[mundo hacker]]></category>
		<category><![CDATA[mundohacker]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[radio]]></category>
		<category><![CDATA[radiouniverso.es]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4341</guid>

					<description><![CDATA[<p>Desde el año 2007, mis colegas Antonio Ramos Varón y Jean Paul García Morán dirigen un programa de Radio On-Line dedicado a todos los temas relativos al hacking y seguridad en entornos IT. Este programa llamado "Mundo Hacker" ha sido desde sus comienzos grabado y emitido en la emisora de Radio on-line Radiouniverso.es con gran difusión. Desde sus inicios este programa cuenta con otros muchos colaboradores, como Rubén, Maikel, Yanko, Alberto y finalmente Yago Hansen.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/mundo-hacker-radio-podcast/">Mundo Hacker Radio Podcast</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Desde el año 2007, mis colegas Antonio Ramos Varón y Jean Paul García Morán dirigen un programa de radio on-Line dedicado a todos los temas relativos al hacking y seguridad en entornos IT. Este programa llamado &#8220;Mundo Hacker&#8221; ha sido desde sus comienzos grabado y emitido en la emisora de Radio streaming <em>Radiouniverso.es</em> con gran difusión. Desde sus inicios este programa cuenta con otros muchos colaboradores, como Rubén, Maikel, Yanko, Alberto y  Yago Hansen.</p>



<p>Pocas personas escriben código y sin embargo el código afecta a muchas personas. Esta es la premisa de un mundo virtual donde las leyes físicas de la naturaleza no son aplicables, el código es ahora la ley que dicta el comportamiento de los internautas. Esta nueva sociedad digital tiene varias tendencias paralelas al mundo físico en el cual vivimos, entre ellas la lucha por el control. De aquí nace el hacktivismo, el activismo y desobediencia social que lucha por tener una voz y pelea por sus derechos.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="300" height="300" src="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image.jpg" alt="" class="wp-image-4338" srcset="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image.jpg 300w, https://yagohansen.com/wp-content/uploads/mundohacker02-06-08-25-mp3-image-150x150.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></figure>



<h2><strong><em>Programas de radio en Podcast</em></strong></h2>



<p><em>En este programa se exploran las distintas tendencias de un nuevo mundo digital que no es conocido por muchos. Se dan a conocer las subculturas que han ido creciendo en Internet debido al impulso tecnológico, donde lo que se consideraba &#8216;underground&#8217; o &#8216;marginal&#8217; es ahora un impulso social. Se dará a conocer las amenazas cibernéticas que desatan una guerra digital, las tendencias de seguridad informática y un mundo de activistas sociales que luchan ante las corporaciones. Se dará a conocer el mundo de los Hackers.</em></p>



<p></p>



<h2>Robo de identidad en Internet</h2>



<p><strong>TITULO</strong>: Robo de identidad en Internet<br><strong>SINOPSIS</strong>: En este primer programa de Mundo Hacker debatimos sobre el robo de identidades en Internet. Explica sobre las conductas criminales sobre el robo de identidad y el mal uso que se puede hacer de ella.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko Kolev</p>



<figure class="wp-block-audio aligncenter"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker12-06-07.2-1.mp3"></audio><figcaption>Mundo Hacker Radio 12/06/2007 Podcast episode</figcaption></figure>



<h2>La sensibilidad de los datos privados en el e-mail</h2>



<p><strong>TITULO</strong>: Datos privados en e-mail<br><strong>SINOPSIS</strong>: En los últimos tiempos se habla mucho del robo de información en los sistemas públicos de correo electrónico, como Hotmail, Yahoo, G-mail, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko y Jacinto</p>



<figure class="wp-block-audio aligncenter"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-06-07.18.mp3"></audio><figcaption>Mundo Hacker Radio 19/06/2007 Podcast episode</figcaption></figure>



<h2>Hacktivismo, activismo Social de los hackers</h2>



<p><strong>TITULO</strong>: Hacktivismo<br><strong>SINOPSIS</strong>: Debate sobre las actividades de grupos sociales hackers o hacktivistas como medio de protesta social y activismo social ético y no-ético.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto y Yanko</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker26-06-07.21.mp3"></audio><figcaption>Mundo Hacker Radio 26/06/2007 Podcast episode</figcaption></figure>



<h2>Las Raíces del hacktivismo</h2>



<p><strong>TITULO</strong>: Las Raíces del hacktivismo<br><strong>SINOPSIS</strong>: Cultura underground sobre los mejores hackers dedicados al hacktivismo como tal del mundo.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker03-07-07.29.mp3"></audio><figcaption>Mundo Hacker Radio 03/07/2007 Podcast episode</figcaption></figure>



<h2>Ciberguerra</h2>



<p><strong>TITULO</strong>: Ciberguerra<br><strong>SINOPSIS</strong>: En este programa tratamos sobre una posible guerra cibernética y las consecuencias que eso podría traer a Gobiernos y Corporaciones.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker17-07-07.22.mp3"></audio><figcaption>Mundo Hacker Radio 17/07/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad inalámbrica </h2>



<p><strong>TITULO</strong>: Inseguridad inalámbrica<br><strong>SINOPSIS</strong>: Tercer capítulo sobre tecnología Wi-Fi y los medios para securizarla, además de sus inseguridaddes vigentes<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Jacinto, Yago Hansen</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-07-07.5.mp3"></audio><figcaption>Mundo Hacker Radio 24/07/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad Inalámbrica (I)</h2>



<p><strong>TITULO</strong>: Inseguridad Inalámbrica (I)<br><strong>SINOPSIS</strong>: Es nuestro primer programa sobre redes inalábricas como Wi-Fi y su seguridad y vulnerabilidad. Presentamos los tipos de hacking y los autores y funciones de cada uno.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker25-07-07.11.mp3"></audio><figcaption>Mundo Hacker Radio 25/07/2007 Podcast episode</figcaption></figure>



<h2>Microsoft, la amenaza</h2>



<p><strong>TITULO</strong>: Microsoft, la amenaza<br><strong>SINOPSIS</strong>: Debate sobre ciberrevolución que se creó en Chile al decidirse un acuerdo comercial por parte del Gobierno con Microsoft como proveedor de Software. Hacktivismo en contra de este acuerdo.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker31-07-07.13.mp3"></audio><figcaption>Mundo Hacker Radio 31/07/2007 Podcast episode</figcaption></figure>



<h2>Firewalls</h2>



<p><strong>TITULO</strong>: Firewalls<br><strong>SINOPSIS</strong>: Visión amplia y racional de los cortafuegos en formato software o appliance, para conocer a fondo estas herramientas.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Fernado Picouto Ramos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker04-09-07.16.mp3"></audio><figcaption>Mundo Hacker Radio 04/09/2007 Podcast episode</figcaption></figure>



<h2>Bluetooth Hacking</h2>



<p><strong>TITULO</strong>: Bluetooth Hacking<br><strong>SINOPSIS</strong>: Angel y sus colegas comparten sus conocimientos sobre tecnologías inalámbricas Bluetooth y sus usos maliciosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jacinto, Yanko Kolev, Angel García</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker11-09-07.27.mp3"></audio><figcaption>Mundo Hacker Radio 11/09/2007 Podcast episode</figcaption></figure>



<h2>Ficheros logs</h2>



<p><strong>TITULO</strong>: Ficheros logs<br><strong>SINOPSIS</strong>: Describimos los ficheros logs, junto con su importancia y su presencia actual en todos los servidores y equipos de red afecta a cualquier movimiento en la red.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko Kolev</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-09-07.23.mp3"></audio><figcaption>Mundo Hacker Radio 18/09/2007 Podcast episode</figcaption></figure>



<h2>Canales seguros de comunicación</h2>



<p><strong>TITULO</strong>: Canales seguros de comunicación<br><strong>SINOPSIS</strong>: Todo lo importantes sobre el establecimiento y uso de canales seguros de comunicación, principalmente en Internet.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yanko, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-10-07.12.mp3"></audio><figcaption>Mundo Hacker Radio 16/10/2007 Podcast episode</figcaption></figure>



<h2>Escaneadores de vulnerabilidades</h2>



<p><strong>TITULO</strong>: Escaneadores de vulnerabilidades<br><strong>SINOPSIS</strong>: Conocimientos básicos sobre los escaneadores de vulnerabilidades para detectar errores o bugs y posteriormente utilizarlos para penetración en sistemas.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker30-10-07.24.mp3"></audio><figcaption>Mundo Hacker Radio 30/10/2007 Podcast episode</figcaption></figure>



<h2>Inseguridad inalámbrica Wi-Fi (II)</h2>



<p><strong>TITULO</strong>: Inseguridad inalámbrica Wi-Fi (II)<br><strong>SINOPSIS</strong>: Volvemos sobre el tema de la seguridad en las redes inalámbricas, especialmente Wi-Fi en este segundo programa relacionado.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker13-11-07.15.mp3"></audio><figcaption>Mundo Hacker Radio 13/11/2007 Podcast episode</figcaption></figure>



<h2>Los protocolos ARP y RARP</h2>



<p><strong>TITULO</strong>: Los protocolos ARP y RARP<br><strong>SINOPSIS</strong>: Uso del protocolo ARP y RARP como herramienta para hacking y consecuencias de su utilización en la resolucion de direcciones IP.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Codename</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker20-11-07.7.mp3"></audio><figcaption>Mundo Hacker Radio 20/11/2007 Podcast episode</figcaption></figure>



<h2>IDS e IPS, detección de intrusos</h2>



<p><strong>TITULO</strong>: IDS e IPS, detección de intrusos<br><strong>SINOPSIS</strong>: El especialista en seguridad Fernando Picouto da una buena explicación sobre la implementación y el funcionamiento de los sistemas de detección y prevención de intrusos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Fernando Picouto Ramos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-11-07.17.mp3"></audio><figcaption>Mundo Hacker Radio 27/11/2007 Podcast episode</figcaption></figure>



<h2>Hardware hacking</h2>



<p><strong>TITULO</strong>: Hardware hacking<br><strong>SINOPSIS</strong>: Los asistentes explican algunas formas de hacer hacking mediante hardware autoconstruido como keyloggers, cpus, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker11-12-07.28.mp3"></audio><figcaption>Mundo Hacker Radio 11/12/2007 Podcast episode</figcaption></figure>



<h2>Keylogger (II) y USB hacks</h2>



<p><strong>TITULO</strong>: Keylogger (II) y USB hacks<br><strong>SINOPSIS</strong>: Jacinto continúa con su explicación sobre la construcción de un keylogger made in Hell e introducción a los pendrive ladrones de información o USB hacks.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto y Yanko Kolev</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-12-07.19.mp3"></audio><figcaption>Mundo Hacker Radio 18/12/2007 Podcast episode</figcaption></figure>



<h2>Phreaking</h2>



<p><strong>TITULO</strong>: Phreaking<br><strong>SINOPSIS</strong>: Tratamos sobre las técnicas actuales que se utilizan para el cracking de telefonía tanto fija como móvil.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko Kolev, Jacinto, Jesus FK</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker15-01-08.31.mp3"></audio><figcaption>Mundo Hacker Radio 15/01/2008 Podcast episode</figcaption></figure>



<h2>Inyección de Código SQL</h2>



<p><strong>TITULO</strong>: Inyección de Código SQL<br><strong>SINOPSIS</strong>: Explicamos las posiblidades y el nivel de peligrosidad de los ataques de inyección de código SQL generando procedimientos almacenados muy peligrosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Maikel, Jacinto, Quark</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker05-02-08.1.mp3"></audio><figcaption>Mundo Hacker Radio 05/02/2008 Podcast episode</figcaption></figure>



<h2>MD5 y SHA1, Ataques de colisión</h2>



<p><strong>TITULO</strong>: MD5 y SHA1, Ataques de colisión<br><strong>SINOPSIS</strong>: Explicamos de forma relativamente fácil de entender el mecanismo de reducción de mensajes, especialmente MD5 y SHA1 y su ataque de hacking mediante colisiones.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yago Hansen, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-02-08.8.mp3"></audio><figcaption>Mundo Hacker Radio 19/02/2008 Podcast episode</figcaption></figure>



<h2>Botnets (I)</h2>



<p><strong>TITULO</strong>: Botnets (I)<br><strong>SINOPSIS</strong>: Programa que explica el funcionamiento y la creación de botnets o redes de bots que controlan de forma maliciosa millones de ordenadores en Internet bajo el control de un administrador.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto, Rubén y Carlos</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker04-03-08.6.mp3"></audio><figcaption>Mundo Hacker Radio 04/03/2008 Podcast episode</figcaption></figure>



<h2>Ataques XSS (I)</h2>



<p><strong>TITULO</strong>: Ataques XSS (I)<br><strong>SINOPSIS</strong>: Explicación y desarrollo de los ataques Web de tipo XSS sobre los clientes web basándose en formularios no filtrados.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Jacinto y Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker01-04-08.26.mp3"></audio><figcaption>Mundo Hacker Radio 01/04/2008 Podcast episode</figcaption></figure>



<h2>Inyección de código XSS (II) y Endpoint Security</h2>



<p><strong>TITULO</strong>: Inyección de código XSS (II) y Endpoint Security<br><strong>SINOPSIS</strong>: Volvemos a tratar el tema de inyección de código mediante XSS (crosscripting) mediante Javascript en películas y otros programas Flash. Mediante Actionscript y otros lenguajes. Además damos una introducción sobre Endpoint Security.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Rubén, Jacinto</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker06-05-08.9.mp3"></audio><figcaption>Mundo Hacker Radio 06/05/2008 Podcast episode</figcaption></figure>



<h2>Endpoint Security</h2>



<p><strong>TITULO</strong>: Endpoint Security<br><strong>SINOPSIS</strong>: Todo sobre seguridad en el puesto final o endpoint security para los ejecutivos que viajan con su portatil. Medios de protección para los dispositivos portatiles o fijos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Yanko, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08.25.mp3"></audio><figcaption>Mundo Hacker Radio 02/06/2008 Podcast episode</figcaption></figure>



<h2>Inseguridad Inalámbrica (IV)</h2>



<p><strong>TITULO</strong>: Inseguridad Inalámbrica (IV)<br><strong>SINOPSIS</strong>: Es nuestro cuarto programa sobre redes inalábricas como Wi-Fi y su seguridad y vulnerabilidad. Presentamos los tipos de hacking y los autores y funciones de cada uno.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker08-07-08.20.mp3"></audio><figcaption>Mundo Hacker Radio 08/07/2008 Podcast episode</figcaption></figure>



<h2>Coldboot attack</h2>



<p><strong>TITULO</strong>: Coldboot attack<br><strong>SINOPSIS</strong>: Ataque basado en la persistencia electríca de los estados de los chips de la memoria basados en cryogenia. Técnica antigua utilizado en la forénsica.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Santiago, Maikel, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-09-08.30.mp3"></audio><figcaption>Mundo Hacker Radio 16/09/2008 Podcast episode</figcaption></figure>



<h2>Botnets, el enemigo oculto</h2>



<p><strong>TITULO</strong>: Botnets, el enemigo oculto<br><strong>SINOPSIS</strong>: Volvemos a tratar sobre botnets, pero específicamente mediatne P2P, para causar denegación de servicio contra un servidor víctima mediante redirección de tráfico.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker04-11-08.10.mp3"></audio><figcaption>Mundo Hacker Radio 04/11/2008 Podcast episode</figcaption></figure>



<h2>Anónimos en la Red</h2>



<p><strong>TITULO</strong>: Anónimos en la Red<br><strong>SINOPSIS</strong>: Todo sobre el anónimato o invisibilidad cuando estamos navegando por Internet. Nuestros datos personales y la trazabilidad.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Yago Hansen, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker09-12-08.3.mp3"></audio><figcaption>Mundo Hacker Radio 09/12/2008 Podcast episode</figcaption></figure>



<h2>Análisis forense y herramientas</h2>



<p><strong>TITULO</strong>: Análisis forense y herramientas<br><strong>SINOPSIS</strong>: Explicación y debate sobre las técnicas utilizadas para el análisis científico forénsico de dispositivos digitales o de actos maliciosos.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Alberto, Maikel, Rubén</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-01-09.4.mp3"></audio><figcaption>Mundo Hacker Radio 27/01/2009 Podcast episode</figcaption></figure>



<h2>NAC Sistema de control de acceso a la red </h2>



<p><strong>TITULO</strong>: NAC Sistema de control de acceso a la red<br><strong>SINOPSIS</strong>: Un programa en el que aclaramos todos los términos necesarios para la aplicación de las tecnologías NAC de control de acceso a la red.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Francisco (Netbi0s)</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker10-04-09.14.mp3"></audio><figcaption>Mundo Hacker Radio 10/04/2009 Podcast episode</figcaption></figure>



<h2>Cifrado mediante PGP</h2>



<p><strong>TITULO</strong>: NAC Sistema de control de acceso a la red<br><strong>SINOPSIS</strong>: Un programa en el que se habla sobre el cifrado PGP de claves asimétricas muy utilizado en la transmisión de secretos. <br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Yago Hansen</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker23-09-09.33.mp3"></audio><figcaption>Mundo Hacker Radio 23/09/2009 Podcast episode</figcaption></figure>



<h2>Seguridad en cibercafés</h2>



<p><strong>TITULO</strong>: Seguridad en cibercafés<br><strong>SINOPSIS</strong>: Un programa en el que se habla los problemas de la seguridad en cibercafés, locutorios, workcenters, etc.<br><strong>PARTICIPANTES</strong>: Antonio Ramos Varón, Jean Paul García Morán, Maikel, Yago Hansen, Francisco (NetBi0s)</p>



<figure class="wp-block-audio"><audio controls src="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-09-09.32.mp3"></audio><figcaption>Mundo Hacker Radio 24/09/2009 Podcast episode</figcaption></figure>
<p>The post <a rel="nofollow" href="https://yagohansen.com/mundo-hacker-radio-podcast/">Mundo Hacker Radio Podcast</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker12-06-07.2-1.mp3" length="58557802" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-06-07.18.mp3" length="57154295" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker31-07-07.13.mp3" length="0" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker30-10-07.24.mp3" length="52805432" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-11-07.17.mp3" length="52384965" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker17-07-07.22.mp3" length="68318905" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-07-07.5.mp3" length="67216095" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker25-07-07.11.mp3" length="67215998" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-09-07.23.mp3" length="60409958" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-10-07.12.mp3" length="53551907" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker13-11-07.15.mp3" length="53775933" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker18-12-07.19.mp3" length="61345141" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker15-01-08.31.mp3" length="53783873" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker19-02-08.8.mp3" length="48650498" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker02-06-08.25.mp3" length="52858509" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker16-09-08.30.mp3" length="51654371" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker27-01-09.4.mp3" length="51654789" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker23-09-09.33.mp3" length="48485222" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker24-09-09.32.mp3" length="53086535" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker03-07-07.29.mp3" length="58397304" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker11-12-07.28.mp3" length="55931767" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker05-02-08.1.mp3" length="54240700" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker01-04-08.26.mp3" length="125516742" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker06-05-08.9.mp3" length="53006467" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker08-07-08.20.mp3" length="54501924" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker04-11-08.10.mp3" length="53464134" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker09-12-08.3.mp3" length="53465388" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker10-04-09.14.mp3" length="48923007" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker04-03-08.6.mp3" length="52673771" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker20-11-07.7.mp3" length="52652459" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker11-09-07.27.mp3" length="64882843" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/mundohacker04-09-07.16.mp3" length="53892958" type="audio/mpeg" />
<enclosure url="https://yagohansen.com/wp-content/uploads/2020/PodCast/mundohacker26-06-07.21.mp3" length="58271500" type="audio/mpeg" />

			</item>
		<item>
		<title>Cybersecurity in remote work</title>
		<link>https://yagohansen.com/cybersecurity-in-remote-work-2/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 14:48:45 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[remote]]></category>
		<category><![CDATA[work]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4250</guid>

					<description><![CDATA[<p>Currently, almost all companies of a certain size provide employees with work tools such as secure platform laptops, VPNs for remote connection to the intranet, remote access protection, remote access infrastructures, etc. All this means that a company that is already prepared to work remotely will not have any variation or loss of security in its remote access policies.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/cybersecurity-in-remote-work-2/">Cybersecurity in remote work</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://yagohansen.com/wp-content/uploads/2018/09/im001-1024x683.jpg" alt="" class="wp-image-1191" width="591" height="394" srcset="https://yagohansen.com/wp-content/uploads/2018/09/im001-1024x683.jpg 1024w, https://yagohansen.com/wp-content/uploads/2018/09/im001-300x200.jpg 300w, https://yagohansen.com/wp-content/uploads/2018/09/im001-768x512.jpg 768w, https://yagohansen.com/wp-content/uploads/2018/09/im001.jpg 1200w" sizes="(max-width: 591px) 100vw, 591px" /><figcaption>remote work</figcaption></figure>



<h2>Is it easier to attack a company via a remote connecting worker? Why?</h2>



<p>Not quite. Currently, almost all companies of a certain size provide employees with work tools such as secure platform laptops, VPNs for remote connection to the intranet, remote access protection, remote access infrastructures, etc. All this means that a company that is already prepared to work remotely will not have any variation or loss of security in its remote access policies. At most, when many unintended workers work remotely, you may have some performance, connection speed, or bandwidth issues. The problem occurs when the company has not previously defined remote access policies, practices, and methodologies for teleworking and is currently facing a multitude of employees accessing its intranet from abroad. Haste and lack of preparation can and often create situations of insecurity and even chaos, leading to malfunctions, denials of service and even unforeseen security vulnerabilities, which will put you in a dangerous situation. Security policies and architectures must be prepared in advance and tested in advance, just as making decisions or legislating on impulse is never a good idea. Medium and small companies are much worse prepared for this change and put themselves in more vulnerable situations at the technical and organizational level, depending on insecure and heavy access programs, depending in many cases on personal computers in the teleworker&#8217;s home to connect to their remote jobs. This is indeed a security risk for them since the level of security will depend on the security configuration of the employees and not on the corporate security policies.</p>



<h2>We usually associate teleworking with good access to the management platform and intranet, but what other aspects do we have to take care of?</h2>



<p>Teleworking is associated with many technical and organizational aspects within the structure of a company. Creating good planning for this new capacity is necessary to implement good policies, compliance regulations, standards, management and operating regulations, privacy policies, human resources policies, support structures, etc. It is not something banal that can be organized in a couple of days and affects many organizational and technical aspects. It is very important to take all this into account when implementing efficient and safe remote work policies, which also continue to meet all regulatory and legal requirements. In addition there is the secure access infrastructure that allows sustaining all of the above in an efficient, redundant and reliable way. If all this has been taken into account, the truth is that teleworking today is a great solution to improve our quality of life and work, reconcile work and family and not agglomerate the population around large cities, in addition to lowering production costs for companies.</p>



<h2>What would be the best solution? What must be provided to the worker?</h2>



<p>The best solution is planning and organization as I already mentioned. If the worker is provided with the necessary access and control tools, safety and efficiency problems are avoided in most cases. A well-configured laptop, platform by the company and equipped with the necessary programs and utilities to do the job well, will only depend on a good VPN-type remote access and a good access speed both for the employee&#8217;s internet access and for the width of the company&#8217;s access band. This allows using the same platforms, tools, programs, devices as if we were inside the facilities. On the other hand, it allows us to hold conferences, person-to-person or group videoconferences with different employees and departments. In general, in corporations the work changes little when it is executed remotely than locally. In small and medium-sized companies it is usually different and it is not prepared for this type of structural changes, although they can be adapted normally if they do not depend on production environments, such as manufacturing, machines, warehouses, products, etc.</p>



<h2>From the worker&#8217;s point of view, what measures do you have to take? Especially if you work with your own teams</h2>



<p>The worker is not responsible in any case for providing the security or the necessary infrastructure for remote access, especially when this situation has not been contracted with the company. The latter must not provide the access platform, or even their own personal equipment for the development of their work, unless they were freelance or self-employed. A similar situation occurs when employees use their laptops within the intranet or even their own smartphones in many cases. Safety planning should always start with the company and never with the employee.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/cybersecurity-in-remote-work-2/">Cybersecurity in remote work</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy and COVID-19</title>
		<link>https://yagohansen.com/privacidad-y-covid-19/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 13:38:16 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://yagohansen.com/?p=4230</guid>

					<description><![CDATA[<p>One of the most important, most private and most protected types of personal data by fundamental rights, by international laws and by private organizations must always be that of a health nature. A pandemic, which is a threat that we have previously faced, although now in a fully digital era, is not sufficient reason to modify this fundamental right of each individual. Justifying the benefits of digitizing everything is not enough reason to renounce inalienable rights that protect us from digital totalitarianism.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/privacidad-y-covid-19/">Privacy and COVID-19</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-1024x576.jpg" alt="Covid-19 coronavirus" class="wp-image-4228" width="993" height="557" srcset="https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-300x169.jpg 300w, https://yagohansen.com/wp-content/uploads/200309-D-HN545-003-768x432.jpg 768w" sizes="(max-width: 993px) 100vw, 993px" /><figcaption>Coronavirus Disease 2019 Rotator Graphic for af.mil.  (U.S. Air Force Graphic by Rosario &#8220;Charo&#8221; Gutierrez)</figcaption></figure>



<h2>How would you summarize the main keys of the technological solution that they propose.</h2>



<p>One of the most important, most private and most protected types of personal data by fundamental rights, by international laws and by private organizations must always be that of a health nature. A pandemic, which is a threat that we have previously faced, although now in a fully digital era, is not sufficient reason to modify this fundamental right of each individual. Justifying the benefits of digitizing everything is not enough reason to renounce inalienable rights that protect us from digital totalitarianism.</p>



<p>Faced with this type of news, I face the two faces of technology, the one that affects me as an individual and the one that affects me as an expert hacker in cybersecurity.</p>



<p>The one that affects me as a person, obliges me to protect at all times the integrity of private data about any other common interest. The common interest should not be achieved by forcing the renunciation of the fundamental rights of each citizen.</p>



<p>As a hacker, I think that everything must be analyzed, all the information must be verified before deciding to use it as the basis of a project of this size. All sources must be questioned and any project must be thoroughly tested before being published.</p>



<p>Looking at the case as a project that aims to help society in the face of the dangers of COVID-19, I think that it would not benefit us so much to live wondering if any person to whom we have been exposed, is the neighbor of the next door, or the dealer of food delivery, or anyone who passes me in the supermarket … may be infected. It does not seem so useful to me, nor do I think it solves too many health problems, although it will, however, force us to grow in paranoia, hatred or suspicion of others. Has it been studied what this would bring to society at the health or psychological level? What if the app constantly detects a positive when I&#8217;m at home … maybe a neighbor?</p>



<h2>What do you think Google and Apple can contribute if local initiatives such as Singapore or South Korea have not arrived, which have received so much praise?</h2>



<p>First of all, as I indicated earlier, when a project of this size is carried out, we can build on the famous initiatives &#8220;that have been so successful&#8221; in totalitarian countries, as the basis of the virtues for this project. But that means that we now take for &#8220;verified and totally valid information&#8221; the censored information we receive from these countries regarding the benefits of their digital systems in controlling the epidemic.</p>



<p>And now it turns out that this is &#8220;verified information for us&#8221;, when we cannot even confirm in a certain way the number of affected, deceased or the real impact of the digital surveillance data of citizens in the fight against the pandemic within these countries. . Therefore, if the foundations that justify this project fail, the project itself is questionable, especially when it comes from digitally totalitarian countries.</p>



<p>Currently the developers, Apple and Google indicate that the user through an official APP of each government would enter the data of being positive in COVID voluntarily and personally. But the legal, privacy and regulatory framework are constantly changing and who guarantees that this does not change in a while and that the government itself enters this data through the health system from the COVID tests of its hospitals and health centers? Recall that this information about Apple and Google that we handle today was already prepared weeks / months ago by manufacturers and that by chance the Spanish regulatory framework changed days ago preparing for this technology.</p>



<h2>Do you think that it is possible by pulling the bluetooth and not the GPS to offer an effective tracking of these contacts?</h2>



<p>Technically it is. Bluetooth also offers close location technologies that can be related to the GPS of the smart device. We must not forget that it is already geolocated constantly on smartphones by Google and Apple, something that already allows them to constantly obtain the location of any individual. This initiative cannot be valued as something unique and independent. The information obtained can always be added to other sources, such as the real-time geolocation of the devices. If I already have a record of a user&#8217;s location, day after day, hour after hour, minute and minute, second after second … I can contrast, compare this information with any other, such as bluetooth to add data that will allow it soon discourage her. Example: I have a list of anonymous mobile identifiers that have passed by me today. Tomorrow I do the same tour again, I bump into the same or similar people and also collect information from anonymous identifiers. On the third day, I do the same, but he informs me that I have stumbled upon a COVID positive. Logically I can mentally identify who it could be. On a digital level, for large companies such as these, it is even easier to de-anonymize the information, since they have enough information to compare this local database with other more powerful ones, such as geolocation of devices by common places, etc.</p>



<h2>With the information they have published, can it be assumed that the data is really private and not?</h2>



<p>It is difficult to affirm that something determined is private today. Technology indicates that the information stays for fourteen days on each person&#8217;s device, until a positive is entered in the application.</p>



<p>This technology is not a simple application but a major modification to the Bluetooth stack of Google&#8217;s Android and Apple&#8217;s iOS-based operating systems. It is implemented through updates on the phones and not a simple APP that we install, which gives the device full control over what is done, what is collected, what is stored or what is sent. It is a radical change in technology and as such is dangerous.</p>



<p>I have always defended the idea that what today is private, protected or encrypted data does not mean that tomorrow it cannot be converted, through technology or cybercrime, into public and accessible data. A database encrypted with a encryption type of ten years ago can easily be broken today to decrypt and extract your information. Therefore, when handling such private or confidential data, we cannot think from a short-term point of view.</p>



<p>What if another application (such as a gaming APP) accesses the information saved by this protocol and sends it to your cloud, in addition to using your own geolocation of the game to add more data? There would be a risk of data leakage that would have nothing to do with Google or Apple, but that occurs on their devices.</p>



<h2>¿Cuáles son las principales dudas que te genera?</h2>



<p>Moxie Marlinspike, uno de los principales criptógrafos prácticos actuales y desarrolador del sistema de cifrado de Whatsapp afirma que hay graves dudas de seguridad en este planteamiento. Se podría, desde atacar al sistema generando falsa información, denegar el servicio impidiendo que funcione correctamente, o generar falsos positivos impidiendo que los datos sean fiables y útiles .</p>



<p>Personalmente dudo de las bondades de este sistema, además de la seguridad del mismo en su aplicación real. Además este tipo de tecnologías son muy &#8220;fáciles&#8221; de implementar pero resultan, por experiencia, difíciles de desimplementar. Si de verdad es una solución provisional para este caso de alarma, se debería dejar claro que se desimplentará definitivamente tras la alarma.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/privacidad-y-covid-19/">Privacy and COVID-19</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers, coleagues &#038; friends</title>
		<link>https://yagohansen.com/gallery/poi/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 15:08:57 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_gallery&#038;p=3582</guid>

					<description><![CDATA[<p>A gallery of my Persons Of Interest (POI), hackers, intellectuals, friends and just persons I appreciate or have been colleagues! Thank you all for sharing!</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/gallery/poi/">Hackers, coleagues &#038; friends</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-vc-full-width="true" data-vc-full-width-init="false" data-vc-stretch-content="true" class="vc_row wpb_row vc_row-fluid vc_custom_1586805943322 vc_row-has-fill vc_row-no-padding"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>Persons Of Interest (POI)</strong></p>
<p>A gallery with some of my Persons Of Interest (POI), hackers, intellectuals, friends and just persons I appreciate or have been colleagues! Thank you all for sharing!</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row-full-width vc_clearfix"></div><p>The post <a rel="nofollow" href="https://yagohansen.com/gallery/poi/">Hackers, coleagues &#038; friends</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hack In The Box 2019</title>
		<link>https://yagohansen.com/project/hack-in-the-box-2019/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 13:22:48 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2294</guid>

					<description><![CDATA[<p>Charla en el congreso internacional Hack In The Box 2019. Amsterdam. Holanda. Además presentación del libro &#8220;The hacking hardware toolkit&#8221; y stand en el congreso HITB Armory is a dedicated area for independent researchers to show of their projects, run their demos, and allow you to play around with their awesome security tools!</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/hack-in-the-box-2019/">Hack In The Box 2019</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Charla en el congreso internacional Hack In The Box 2019.  Amsterdam. Holanda. Además presentación del libro &#8220;The hacking hardware toolkit&#8221; y stand en el congreso HITB Armory is a dedicated area for independent researchers to show of their projects, run their demos, and allow you to play around with their awesome security tools! </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="769" src="https://yagohansen.com/wp-content/uploads/28663-01-1024x769.jpg" alt="" class="wp-image-3017" srcset="https://yagohansen.com/wp-content/uploads/28663-01-1024x769.jpg 1024w, https://yagohansen.com/wp-content/uploads/28663-01-300x225.jpg 300w, https://yagohansen.com/wp-content/uploads/28663-01-768x577.jpg 768w, https://yagohansen.com/wp-content/uploads/28663-01-1536x1154.jpg 1536w, https://yagohansen.com/wp-content/uploads/28663-01.jpg 1597w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>With some good hacker friends in HITB Amsterdam</figcaption></figure></div>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="768" src="https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010-1024x768.jpg" alt="" class="wp-image-3020" srcset="https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010-1024x768.jpg 1024w, https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010-300x225.jpg 300w, https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010-768x576.jpg 768w, https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010-1536x1153.jpg 1536w, https://yagohansen.com/wp-content/uploads/IMG-20180412-WA0010.jpg 1599w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>With HITB CEO, <br>Dhillon Kannabhiran</figcaption></figure>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="576" height="1024" src="https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-576x1024.jpg" alt="" class="wp-image-3045" srcset="https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-576x1024.jpg 576w, https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-169x300.jpg 169w, https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-768x1365.jpg 768w, https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-864x1536.jpg 864w, https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1-1152x2048.jpg 1152w, https://yagohansen.com/wp-content/uploads/IMG_20190509_094427-scaled-1.jpg 1440w" sizes="(max-width: 576px) 100vw, 576px" /></figure></div>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/hack-in-the-box-2019/">Hack In The Box 2019</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>El Mundo News</title>
		<link>https://yagohansen.com/project/el-mundo-news/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 11:03:28 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2770</guid>

					<description><![CDATA[<p>Yago Hansen tells his opinion in this article in the newspaper El Mundo. They are capable, yes, but they raise their profession of hackers from an ethical point of view and not cybercriminal. &#8220;If you want to know about security, you have to know how a thief acts,&#8221; Hansen said in a recent interview. This&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/el-mundo-news/">El Mundo News</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Yago Hansen tells his opinion in this article in the newspaper El Mundo. They are capable, yes, but they raise their profession of hackers from an ethical point of view and not cybercriminal. &#8220;If you want to know about security, you have to know how a thief acts,&#8221; Hansen said in a recent interview. This is one of the main ideas that you want to convey in the Hacker World 2015 that is celebrated until today in Madrid.</p>



<p><a href="https://www.elmundo.es/espana/2015/04/29/553fe48b268e3e6e308b4573.html">https://www.elmundo.es/espana/2015/04/29/553fe48b268e3e6e308b4573.html</a></p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/el-mundo-news/">El Mundo News</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Forbes 2016</title>
		<link>https://yagohansen.com/project/forbes-2016/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 09:56:40 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=3331</guid>

					<description><![CDATA[<p>The journalist Lucía Martín has written an article on the deep web with the help of hackers Yago Hansen and Yanko Kolev. “In the conventional network, in each communication, my public IP appears, which is like my home address on the Internet. Through Tor Browser, which is the easiest program to navigate this network, your&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/forbes-2016/">Forbes 2016</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The journalist Lucía Martín has written an article on the deep web with the help of hackers Yago Hansen and Yanko Kolev. “In the conventional network, in each communication, my public IP appears, which is like my home address on the Internet. Through Tor Browser, which is the easiest program to navigate this network, your communication is encrypted and enters the already encrypted input node. Then it will go through different nodes, until the exit one, ”says Yago Hansen, ethical hacker and founder of Wifense.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/forbes-2016/">Forbes 2016</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Girls Colombia 2018</title>
		<link>https://yagohansen.com/project/hacker-girls-colombia-2018/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:54:18 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2934</guid>

					<description><![CDATA[<p>With the support of the Universidad del Rosario, MinTIC launched the first international training program for Colombian women in hacking tools: methodologies and techniques that expand knowledge and skills related to cybersecurity. Yago Hansen was the hacker in charge of the initial formation of this group.The beneficiaries are students and professionals from careers such as&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/hacker-girls-colombia-2018/">Hacker Girls Colombia 2018</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With the support of the Universidad del Rosario, MinTIC launched the first international training program for Colombian women in hacking tools: methodologies and techniques that expand knowledge and skills related to cybersecurity. Yago Hansen was the hacker in charge of the initial formation of this group.<br>The beneficiaries are students and professionals from careers such as systems engineering, electronics and telecommunications, who will strengthen their skills to develop mitigation plans that allow countering attacks against computer systems of institutions or companies.</p>



<figure class="wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Primera versión de Hacker Girls Colombia - Abril 10 2018" width="1200" height="675" src="https://www.youtube.com/embed/7_EUA3bX2Lc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
</div></figure>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="438" height="438" src="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045411.jpg" alt="" class="wp-image-2191" srcset="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045411.jpg 438w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045411-300x300.jpg 300w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045411-150x150.jpg 150w" sizes="(max-width: 438px) 100vw, 438px" /></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="768" src="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180407_235137-1024x768.jpg" alt="" class="wp-image-2405" srcset="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180407_235137-1024x768.jpg 1024w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180407_235137-300x225.jpg 300w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180407_235137-768x576.jpg 768w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180407_235137.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="1016" src="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347-1024x1016.jpg" alt="" class="wp-image-2407" srcset="https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347-1024x1016.jpg 1024w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347-300x298.jpg 300w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347-150x150.jpg 150w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347-768x762.jpg 768w, https://yagohansen.com/wp-content/uploads/2020/03/IMG_20180410_045347.jpg 1080w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/hacker-girls-colombia-2018/">Hacker Girls Colombia 2018</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Python Scapy Dot11: Python Programming for Wi-Fi pentesters</title>
		<link>https://yagohansen.com/project/python-scapy-dot11-python-programming-for-wi-fi-pentesters/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:48:17 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2061</guid>

					<description><![CDATA[<p>Amazon KDP, 2018. Edición en inglés para el Mercado anglosajón, editada en formato e-book y paperback por la editorial Amazon Publishing en los países anglosajones en los que publica.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/python-scapy-dot11-python-programming-for-wi-fi-pentesters/">Python Scapy Dot11: Python Programming for Wi-Fi pentesters</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amazon KDP, 2018.  Edición en inglés para el Mercado anglosajón, editada en formato e-book y paperback por la editorial Amazon Publishing en los países anglosajones en los que publica.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/python-scapy-dot11-python-programming-for-wi-fi-pentesters/">Python Scapy Dot11: Python Programming for Wi-Fi pentesters</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AAA / RADIUS / 802.1X</title>
		<link>https://yagohansen.com/project/aaa-radius-802-1x/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:43:34 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2055</guid>

					<description><![CDATA[<p>Editorial Ra-Ma, 2008. Este libro es una gran herramienta para todos aquellos que deseen aprender o ampliar sus conocimientos sobre sistemas basados en la autenticación (sistemas AAA).</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/aaa-radius-802-1x/">AAA / RADIUS / 802.1X</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Editorial Ra-Ma, 2008. Este libro es una gran herramienta para todos aquellos que deseen aprender o ampliar sus conocimientos sobre sistemas basados en la autenticación (sistemas AAA).</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/aaa-radius-802-1x/">AAA / RADIUS / 802.1X</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Appearances in books</title>
		<link>https://yagohansen.com/project/appearances-in-books/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:35:21 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2735</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://yagohansen.com/project/appearances-in-books/">Appearances in books</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>On several occasions Yago Hansen has been referenced in books, end-of-degree projects, masters and other types of technical and non-technical publications. As last examples, he appears in the book &#8220;<a href="https://www.amazon.es/Los-hombres-que-susurran-m%C3%A1quinas/dp/846704621X">The men who whisper to the machines</a>&#8221; by the well-known writer Antonio Salas, in the book &#8220;<a href="https://books.google.es/books?id=p3QkDwAAQBAJ&amp;pg=PA34&amp;lpg=PA34&amp;dq=yago+hansen&amp;source=bl&amp;ots=XsLH8ofinp&amp;sig=ACfU3U11FTOl5Tdj8jMEvuSt7UaWYX7cgg&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj9qbjykcXoAhVOy6QKHQDeAzk4MhDoATAFegQIChAB#v=onepage&amp;q=yago%20hansen&amp;f=false">Where are we going? The entangled society</a>&#8221; of the journalist Alfonso Vázquez Atochero or in the book &#8220;<a href="https://books.google.es/books?id=N81dDwAAQBAJ&amp;pg=PT86&amp;lpg=PT86&amp;dq=yago+hansen&amp;source=bl&amp;ots=S05rxe5iQK&amp;sig=ACfU3U1xKLzjO6tEZV0PHLrQZGTZEDl_PA&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj9qbjykcXoAhVOy6QKHQDeAzk4MhDoATAEegQICRAB#v=onepage&amp;q=yago%20hansen&amp;f=false">Hello, ¿ sex?</a>&#8221; Lucía Martín among others. In addition his books appear in the libraries of many prestigious international universities.</p>
<p>&nbsp;</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><style type="text/css" data-type="the7_shortcodes-inline-css">.shortcode-single-image-wrap.shortcode-single-image-60a46f8226b86e1e35db0bc4afa3802b.enable-bg-rollover .rollover i,
.shortcode-single-image-wrap.shortcode-single-image-60a46f8226b86e1e35db0bc4afa3802b.enable-bg-rollover .rollover-video i {
  background: ;
  background: -webkit-linear-gradient();
  background: linear-gradient();
}
.shortcode-single-image-wrap.shortcode-single-image-60a46f8226b86e1e35db0bc4afa3802b .rollover-icon {
  font-size: 32px;
  color: #ffffff;
  min-width: 44px;
  min-height: 44px;
  line-height: 44px;
  border-radius: 100px;
  border-style: solid;
  border-width: 0px;
}
.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-60a46f8226b86e1e35db0bc4afa3802b .rollover-icon {
  background: rgba(255,255,255,0.3);
  box-shadow: none;
}
</style><div class="shortcode-single-image-wrap shortcode-single-image-60a46f8226b86e1e35db0bc4afa3802b alignleft caption-on  vc_custom_1585734200443 enable-bg-rollover dt-icon-bg-off" ><div class="shortcode-single-image"><div class="fancy-media-wrap" style=""><a href="https://www.amazon.es/Los-hombres-que-susurran-m%C3%A1quinas/dp/846704621X" class=" layzr-bg rollover" style="box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6); -webkit-box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6);" target="_blank" rel="noopener" aria-label="Image"><img class="preload-me lazy-load" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%2080%20121&#39;%2F%3E" data-src="https://yagohansen.com/wp-content/uploads/81ThMs6iL-80x121.jpg" data-srcset="https://yagohansen.com/wp-content/uploads/81ThMs6iL-80x121.jpg 80w, https://yagohansen.com/wp-content/uploads/81ThMs6iL-160x242.jpg 160w" width="80" height="121"  data-dt-location="https://yagohansen.com/project/appearances-in-books/81thms6il/" alt="Antonio Salas" /><span class="rollover-icon icomoon-the7-font-the7-link-00"></span></a></div></div><div class="shortcode-single-caption">Antonio Salas, los hombres que susurran a las máquinas, hackers espias e intrusos en tu ordenador</div></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><style type="text/css" data-type="the7_shortcodes-inline-css">.shortcode-single-image-wrap.shortcode-single-image-1817b1916184138c5ea647e85a76f81a.enable-bg-rollover .rollover i,
.shortcode-single-image-wrap.shortcode-single-image-1817b1916184138c5ea647e85a76f81a.enable-bg-rollover .rollover-video i {
  background: ;
  background: -webkit-linear-gradient();
  background: linear-gradient();
}
.shortcode-single-image-wrap.shortcode-single-image-1817b1916184138c5ea647e85a76f81a .rollover-icon {
  font-size: 32px;
  color: #ffffff;
  min-width: 44px;
  min-height: 44px;
  line-height: 44px;
  border-radius: 100px;
  border-style: solid;
  border-width: 0px;
}
.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-1817b1916184138c5ea647e85a76f81a .rollover-icon {
  background: rgba(255,255,255,0.3);
  box-shadow: none;
}
</style><div class="shortcode-single-image-wrap shortcode-single-image-1817b1916184138c5ea647e85a76f81a alignleft caption-on  vc_custom_1585734545473 enable-bg-rollover dt-icon-bg-off" ><div class="shortcode-single-image"><div class="fancy-media-wrap" style=""><a href="https://www.amazon.es/Hola-%C2%BFSexo-Sexualidad-Luc%C3%ADa-Mart%C3%ADn/dp/8416002371/ref=sr_1_1?__mk_es_ES=%C3%85M%C3%85%C5%BD%C3%95%C3%91&#038;keywords=hola+sexo+lucia+martin&#038;qid=1585734519" class=" layzr-bg rollover" style="box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6); -webkit-box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6);" target="_blank" rel="noopener" aria-label="Image"><img class="preload-me lazy-load" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%2080%20130&#39;%2F%3E" data-src="https://yagohansen.com/wp-content/uploads/hablemosdesexo-80x130.png" data-srcset="https://yagohansen.com/wp-content/uploads/hablemosdesexo-80x130.png 80w, https://yagohansen.com/wp-content/uploads/hablemosdesexo-160x260.png 160w" width="80" height="130"  data-dt-location="https://yagohansen.com/project/appearances-in-books/hablemosdesexo/" alt="Hola, Sexo" /><span class="rollover-icon icomoon-the7-font-the7-link-00"></span></a></div></div><div class="shortcode-single-caption">Hola, Sexo. Anatomia de las citas online. Lucia Martin</div></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-4"><div class="vc_column-inner"><div class="wpb_wrapper"><style type="text/css" data-type="the7_shortcodes-inline-css">.shortcode-single-image-wrap.shortcode-single-image-26982ef0f96cbba03915789d2bbef824.enable-bg-rollover .rollover i,
.shortcode-single-image-wrap.shortcode-single-image-26982ef0f96cbba03915789d2bbef824.enable-bg-rollover .rollover-video i {
  background: ;
  background: -webkit-linear-gradient();
  background: linear-gradient();
}
.shortcode-single-image-wrap.shortcode-single-image-26982ef0f96cbba03915789d2bbef824 .rollover-icon {
  font-size: 32px;
  color: #ffffff;
  min-width: 44px;
  min-height: 44px;
  line-height: 44px;
  border-radius: 100px;
  border-style: solid;
  border-width: 0px;
}
.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-26982ef0f96cbba03915789d2bbef824 .rollover-icon {
  background: rgba(255,255,255,0.3);
  box-shadow: none;
}
</style><div class="shortcode-single-image-wrap shortcode-single-image-26982ef0f96cbba03915789d2bbef824 alignleft  vc_custom_1585734627019 enable-bg-rollover dt-icon-bg-off" ><div class="shortcode-single-image"><div class="fancy-media-wrap" style=""><a href="https://www.amazon.es/%C2%BFHacia-d%C3%B3nde-vamos-sociedad-enredada/dp/1326969994/ref=sr_1_1?__mk_es_ES=%C3%85M%C3%85%C5%BD%C3%95%C3%91&#038;keywords=sociedad+enredada+atochero&#038;qid=1585734576" class=" layzr-bg rollover" style="box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6); -webkit-box-shadow:5px 5px 5px 5px rgba(0,0,0,0.6);" target="_blank" rel="noopener" aria-label="Image"><img class="preload-me lazy-load" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%2080%20113&#39;%2F%3E" data-src="https://yagohansen.com/wp-content/uploads/book2-80x113.png" data-srcset="https://yagohansen.com/wp-content/uploads/book2-80x113.png 80w, https://yagohansen.com/wp-content/uploads/book2-160x226.png 160w" width="80" height="113"  data-dt-location="https://yagohansen.com/project/appearances-in-books/book2/" alt="" /><span class="rollover-icon icomoon-the7-font-the7-link-00"></span></a></div></div></div></div></div></div></div><p>The post <a rel="nofollow" href="https://yagohansen.com/project/appearances-in-books/">Appearances in books</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TeleMadrid</title>
		<link>https://yagohansen.com/project/telemadrid/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:35:04 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2826</guid>

					<description><![CDATA[<p>Be careful when connecting to the internet through a Wi-Fi connection … because if we DO NOT protect our home we may be victims of digital theft … And it is not just that a neighbor can connect to our ADSL. The worrying thing is that someone may commit crimes on our behalf by taking&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/telemadrid/">TeleMadrid</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Be careful when connecting to the internet through a Wi-Fi connection … because if we DO NOT protect our home we may be victims of digital theft … And it is not just that a neighbor can connect to our ADSL. The worrying thing is that someone may commit crimes on our behalf by taking advantage of our router. In dangers like this, today we put the ZOOM of Telemadrid. Yago Hansen tells us about the risks and their possible solution.</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/telemadrid/">TeleMadrid</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>El Pais Newspaper</title>
		<link>https://yagohansen.com/project/el-pais-newspaper/</link>
		
		<dc:creator><![CDATA[Yago Hansen]]></dc:creator>
		<pubDate>Sun, 05 Apr 2020 05:24:01 +0000</pubDate>
				<guid isPermaLink="false">https://yagohansen.com/?post_type=dt_portfolio&#038;p=2778</guid>

					<description><![CDATA[<p>Yago Hansen, a Spanish hacker with experience in the sector, explains how the exchange works: &#8220;You tell the vulnerability to these companies and they assess it according to the exploitation capacity it has.&#8221; When the company acquires the vulnerability, it turns it into an exploit, a malicious program to take advantage of the discovered flaw,&#8230;</p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/el-pais-newspaper/">El Pais Newspaper</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Yago Hansen, a Spanish hacker with experience in the sector, explains how the exchange works: &#8220;You tell the vulnerability to these companies and they assess it according to the exploitation capacity it has.&#8221; When the company acquires the vulnerability, it turns it into an exploit, a malicious program to take advantage of the discovered flaw, and incorporates it into its commercial offer.</p>



<p><a href="https://elpais.com/tecnologia/2019/05/28/actualidad/1559031474_402185.html">https://elpais.com/tecnologia/2019/05/28/actualidad/1559031474_402185.html</a></p>
<p>The post <a rel="nofollow" href="https://yagohansen.com/project/el-pais-newspaper/">El Pais Newspaper</a> appeared first on <a rel="nofollow" href="https://yagohansen.com">Yago Hansen CV</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
