Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Malware
Beyond the Wall logo

Beyond the Wall

Posted on 06/07/2016, by Miguel Herrero (INCIBE)
The 'wildlings' live beyond the wall. Everyone in Westeros knows that. This is why they trust in the Night's Watch, protectors of the Seven Kingdoms. In the world of cybersecurity there are also people who live beyond the wall and we know that not all of them have evil intentions. They may not obey the laws but their intentions do not seem to be to destroy everything that is established by law.
In memoria veritas

In memoria veritas

Posted on 05/12/2016, by Miguel Herrero (INCIBE)
If Pliny The Elder had lived in our times and worked in malware analysis, his proverb most likely would have looked like the title of this post. As malware evolves, the techniques used to hide it within the operating system constantly become more sophisticated. It can be hidden deep in the hard disk or hidden in plain sight in the hope that it will not be discovered, or it can be disguised....
Warning

Malware & Phil

Posted on 03/17/2016, by Miguel Herrero (INCIBE)
In the popular Spanish comics series by the great artist and writer Ibáñez, Phil would become angry with Mort and chase him, normally with some disproportionately large weapon in hand, while Mort would run away in one of his many disguises. A scenario like the one above happens time and again in our operating systems, except that the malware is the character that puts on a disguise to run away...
spotlight

Domestic routers in the spotlight

Posted on 09/24/2015, by Francisco J. Rodríguez (INCIBE)
In INCIBE, using ours sensors, specialized attack campaigns against home routers were detected. From the data obtained it is concluded that the security of home routers remains a point forgotten. In this article the results and conclusions of the analysis are presented.
Ransomware

Combating Ransomware

Posted on 07/15/2015, by Manuel López y Jesús Arnáiz
Given the widespread use of Information and Communications Technology (ICT) in all areas of society, a series of threats against Society have appeared in cyberspace, and they occur in different forms: cybercrime, cyberterrorism, and cyberwarfare, amongst others. Within these cyber threats, those with the generic name Ransomware are evolving quickly and with a major impact. We will explain...

Pages