Personal Information
Occupation
Cybersecurity researcher
Industry
Technology / Software / Internet
Website
junquera.io
Tags
information security
cybersecurity
hacking
presentation
cryptography
rootedcon
tor
jamming
europe
space
critical infrastructures
gps
radio
galileo
health
android
rooted2022
ransomware
threat intellingence
cti
darknet
supply chain
threats
apt
supernova
solar winds
sunburst
solorigate
software development
rooted2020
apple
encryption
backdoor
privacy
fbi
society
internet
workshop
ciberseg
uah
password
stic
xiijornadasccncert
ccn-cert
dark-net
See more
Presentations
(9)Likes
(11)Respuesta ante un ciberataque. Caso Universidad de Castilla-La Mancha
Andres Prado
•
3 years ago
Rooted2020 hunting malware-using_process_behavior-roberto_amado
RootedCON
•
4 years ago
Cómo instalar un servidor VPN de emergencia para una PYME en 5 minutos
Elio Rojano
•
4 years ago
Pepe Vila - Cache and Syphilis [rooted2019]
RootedCON
•
5 years ago
Pablo San Emeterio - Los 7 pecados capitales en el uso de dispositivos móviles [rootedvlc2018]
RootedCON
•
5 years ago
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
RootedCON
•
5 years ago
Secure Hash Algorithm
Vishakha Agarwal
•
8 years ago
Navaja negra2018alfonsomunoz
Alfonso Muñoz, PhD
•
5 years ago
Let's talk about the Ubuntu 18.04 LTS Roadmap!
Dustin Kirkland
•
6 years ago
The PostgreSQL Query Planner
Command Prompt., Inc
•
13 years ago
Personal Information
Occupation
Cybersecurity researcher
Industry
Technology / Software / Internet
Website
junquera.io
Tags
information security
cybersecurity
hacking
presentation
cryptography
rootedcon
tor
jamming
europe
space
critical infrastructures
gps
radio
galileo
health
android
rooted2022
ransomware
threat intellingence
cti
darknet
supply chain
threats
apt
supernova
solar winds
sunburst
solorigate
software development
rooted2020
apple
encryption
backdoor
privacy
fbi
society
internet
workshop
ciberseg
uah
password
stic
xiijornadasccncert
ccn-cert
dark-net
See more