Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cryptography
Last year ransomware became the threat most widely used by attackers to monetise their actions. This fact has also affected industrial sectors which, to a greater or lesser extent, have suffered this type of malware.
Although in industrial environments, availability is king, integrity is also a factor to be taken into account as data must be transferred in unaltered form. The use of mechanisms such as digital signatures helps with integrity, although it is not so simple to implement in all environments.
Blockchain is in fashion. Every month, new systems of this type emerge, applications that use them or companies who base their business models on the opportunities provided by this technology. Despite this boom, there is still a lot of uncertainty surrounding the protocol.
La computación cuántica revolucionará la ciberseguridad tal y como la conocemos. Tecnologías actuales dejarán de ser seguras a medida que irrumpan ordenadores cuánticos con suficiente capacidad. ¿Qué algoritmos tendremos para reemplazar los que vamos dejando atrás?
What is DROWN? DROWN is the name given to a new vulnerability linked to It is therefore a continuation of the trend that has appeared in recent years whereby diverse vulnerabilities have appeared which have a certain impact associated to Internet communication security, for example Heartbleed, POODLE, WinShock, FREAK o Logjam, among others. The acronym DROWN stands for Decrypting RSA with...
There are still a great number of websites that do not use SSL/TLS certificates to encrypt their connections; this has been a problem in web communications security for years. There are various reasons for this; however, perhaps the most important is the fact that historically, having an SSL certificate was unviable economically, particularly for personal websites, SMEs, or small online shops...
We are getting closer to the second edition of CyberCamp, the cybersecurity event organised by INCIBE, which started last year with the aim of bringing together young talent in cybersecurity. This year, it will be held in the Barclaycard Center in Madrid between 26 and 29 November. To detect and identify the best talent in Spain, as in the last edition, we have organised a series of technical...