Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Software
Understanding industrial network traffic, dissectors and Lua and Kaitai

Understanding industrial network traffic, dissectors and Lua and Kaitai

Posted on 06/07/2018, by INCIBE
Not only is the interpretation of network traffic crucial to analyse the safety and performance of a network structure, but also for other tasks, such as incident management, the optimisation of our network infrastructure or for didactic purposes. In order to do so, it is necessary to have dissectors that help separate each of the fields that make up a protocol, and allow them to be individually analysed.
Criptodivisas: su papel en el malware

Cryptocurrency and its role in malware

Posted on 04/12/2018, by José Manuel Roviralta (INCIBE)
It is increasingly common to find malware related to cryptocurrencies, either to use them as payment currency in extortions and illegal activities, cryptocurrency theft or infiltrate on systems and equipment from all areas to take advantage of the resources of the victims' equipment to undermine cryptocurrency
Honeypots industriales

Industrial Honeypots

Posted on 03/23/2017, by INCIBE
The increasing number of attacks to industrial networks forces us to analyse their behaviour so that we can implement measures to mitigate said attacks. One of the options used to learn about the behaviour of attacks is the deployment of honeypots. This article deals with the advantages and challenges of this technology when used in industrial environments.
OS X

OS X security model (II)

Posted on 02/18/2016, by Antonio López (INCIBE)
In the article: Security Model in OS X (I), we introduced the operating system’s main accumulated security features accumulated up to Yosemite (OS X 10.10). With the latest version, launched in September 2015, an interesting new security feature appears in the system. System Integrity Protection (SIP) As of OS X 10.11 (El Capitan), Apple is tightening security measures even further with the...
OS X security model (I)

OS X security model (I)

Posted on 02/11/2016, by INCIBE
Security measures in OS X have been incorporated into the operating system base, with functions added and improved upon as different versions are published. Together,these measures form a layered model that reinforce the basic outline of typical POSIX permissions and provides a mechanism covering various aspects of protection against security threats. Let’s see how this system works. First line...
Let’s Encrypt: The democratisation of SSL certificates

Let’s Encrypt: The democratisation of SSL certificates

Posted on 02/02/2016, by Antonio Rodríguez (INCIBE)
There are still a great number of websites that do not use SSL/TLS certificates to encrypt their connections; this has been a problem in web communications security for years. There are various reasons for this; however, perhaps the most important is the fact that historically, having an SSL certificate was unviable economically, particularly for personal websites, SMEs, or small online shops...

Pages