It is increasingly common to find malware related to cryptocurrencies, either to use them as payment currency in extortions and illegal activities, cryptocurrency theft or infiltrate on systems and equipment from all areas to take advantage of the resources of the victims' equipment to undermine cryptocurrency
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Cybercrime
Denial-of-service attacks are a type of cyber-attack which consists on reducing or cancelling altogether the capacity of servers or other computing resources to provide service. A denial-of-service attack can occur in different scenarios, such as overloading online services by mass request sending or exploiting vulnerabilities of programs or services in order to suspend function totally or partially. In most of such attacks, attackers use a wide range of techniques and tools to hide their identities, which makes it especially challenging to find the culprits.
Last year ransomware became the threat most widely used by attackers to monetise their actions. This fact has also affected industrial sectors which, to a greater or lesser extent, have suffered this type of malware.
The well known motto "there is strength in numbers" perfectly describes the beneficial situation that involves collaboration and knowledge sharing on cyber threats. The concept of Information Sharing bring to us the idea of establishing methods to share and take full benefit of the gathered knowledge among all actors. Among these partners, CERT and security companies play a key role in defining consensus documentation and the pathway for sharing knowledge effectively.
Like their corporate counterparts, industrial systems are constantly evolving in order to become more competitive. One of the improvements taking place in these environments at the moment is the reduction of costs through the use of cloud technology.
Various studies have indicated that bots currently constitute over half of all global Internet traffic. Certain reports, such as "The 2015 Bad Bot Landscape Report" released by Distil Networks, Inc, even divide traffic into legitimate and malicious traffic, concluding that the latter is growing at an alarming rate. The boom that Cloud Computing has experienced in recent times has been one of...
Given the widespread use of Information and Communications Technology (ICT) in all areas of society, a series of threats against Society have appeared in cyberspace, and they occur in different forms: cybercrime, cyberterrorism, and cyberwarfare, amongst others. Within these cyber threats, those with the generic name Ransomware are evolving quickly and with a major impact. We will explain...
In the world of information technology, achieving a status of total security is a goal that is practically impossible. In particular, one of the most persistently sought objectives is to find authentication and identification methods that come close to this total security utopia. Can biometrics bring progress in this issue?
Application layer denial of service attacks are the second main group of Denial of Service (DoS) attacks, along with DoS attacks against the infrastructure layer. As its name indicates, these types of attacks are targeted at the application layer or layer seven of the OSI model. Their objective is to cause a denial of service, taking advantage of design flaws in the communications protocol...