Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Android
Protect

Protect your DNS requests with DNS over TLS

Posted on 07/04/2019, by Ignacio Porro Sáez (INCIBE)
Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.
Portada greatest hits 2016

Greatest Hits 2016

Posted on 01/23/2017, by Miguel Herrero (INCIBE)
El aim of Cybersecurity Highlights service is to gather all relevant news related to cybersecurity through the year. This is the article that summarizes those news that have been more important in 2016.
Balance

Comparative study of mobile architectures

Posted on 05/31/2016, by Asier Martínez (INCIBE)
The following article shall outline the most significant technical specifications of the main mobile platforms. Accordingly, the 4 most widely used mobile platforms are going to be taken into account based on their market share: Android, iOS, Windows Phone and BlackBerry OS.
forensic analyses on mobile devices

Tools for carrying out forensic analyses on mobile devices

Posted on 02/23/2016, by Asier Martínez (INCIBE)
When carrying a forensic analysis for mobile device , bearing in mind first and foremost the phases of acquisition and analysis of the evidence, it is necessary to know a wide range of methods, techniques and tools as well as the criteria necessary for being able to evaluate the suitability of using one versus another.
2015 Cybersecurity Highlights

2015 Cybersecurity Highlights log

Posted on 01/28/2016, by David Cantón (INCIBE)
Nobody can deny that computer security is a vital issue in our lives, affecting all of us. It is not uncommon to see articles on themes related to or speaking directly about computer security in newspapers or mainstream publications. The INCIBE_ Cybersecurity Highlights log aims to gather together articles published on events or incidents related to computer security based on their importance...
Not on my shift...

Contactless payment? Not on my shift...

Posted on 12/18/2014, by Miguel Herrero (INCIBE)
Mobile Pwn2Own 2014, an event focused on discovering vulnerabilities targeting last generation mobiles, compromised five top quality smartphones. Different techniques were used to compromise these, being NFC the technology used to vulnerate Samsung Galaxy 5 and LG Nexus 5 and getting control of the mobile. It is not the first time NFC stars in security news. Not too long ago we could see how a...