Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Threats
2015 Cybersecurity Highlights

2015 Cybersecurity Highlights log

Posted on 01/28/2016, by David Cantón (INCIBE)
Nobody can deny that computer security is a vital issue in our lives, affecting all of us. It is not uncommon to see articles on themes related to or speaking directly about computer security in newspapers or mainstream publications. The INCIBE_ Cybersecurity Highlights log aims to gather together articles published on events or incidents related to computer security based on their importance...
camera

Physical security and cybersecurity go hand in hand: CCTV

Posted on 11/17/2015, by Daniel Fírvida (INCIBE)
In recent years different news has emerged linked to webcam and IP camera attacks, such as the vulnerabilities of any system, embedded credentials, and the most well-known, open cameras without a password... as well as many other examples. These security failures are not alien to more professional systems such as video recorders or DVRs and closed-circuit television or CCTV cameras. A few...
spotlight

Domestic routers in the spotlight

Posted on 09/24/2015, by Francisco J. Rodríguez (INCIBE)
In INCIBE, using ours sensors, specialized attack campaigns against home routers were detected. From the data obtained it is concluded that the security of home routers remains a point forgotten. In this article the results and conclusions of the analysis are presented.
Ransomware

Combatting Ransomware

Posted on 07/15/2015, by Manuel López y Jesús Arnáiz
Given the widespread use of Information and Communications Technology (ICT) in all areas of society, a series of threats against Society have appeared in cyberspace, and they occur in different forms: cybercrime, cyberterrorism, and cyberwarfare, amongst others. Within these cyber threats, those with the generic name Ransomware are evolving quickly and with a major impact. We will explain...
DoS

DoS: Application Layer

Posted on 05/21/2015, by David Cantón (INCIBE)
Application layer denial of service attacks are the second main group of Denial of Service (DoS) attacks, along with DoS attacks against the infrastructure layer. As its name indicates, these types of attacks are targeted at the application layer or layer seven of the OSI model. Their objective is to cause a denial of service, taking advantage of design flaws in the communications protocol...
DoS Attacks

DoS Attacks: Infrastructure Layer

Posted on 04/09/2015, by David Cantón (INCIBE)
As we have already mentioned previously, infrastructure attacks are those that focus mainly on layers three and four of the OSI model (ISO/IEC 7498-1) and application layer protocols that support communications, such as DNS or NTP. This is the most frequent type of attack and, as illustrated in the following graphic, makes up 90% of the DDoS attacks detected by Akamai in the fourth quarter of...

Pages