Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Vulnerability
Today there is not a mobile phone on the planet that does not feature Bluetooth technology to connect to other wireless devices. To add to this, the emergence of the Industrial Internet of Things (IIoT) has generated multiple vectors of attack through this technology.
Embedded devices are Los dispositivos embebidos are becoming ever more present in the systems of today; such as end devices, whether cars, industrial machinery or in the areas of health, robotics, etc. Moreover, with the emergence of the Internet of Things (IoT), the use of communication devices and information exchange is expanding even further.
What is DROWN? DROWN is the name given to a new vulnerability linked to It is therefore a continuation of the trend that has appeared in recent years whereby diverse vulnerabilities have appeared which have a certain impact associated to Internet communication security, for example Heartbleed, POODLE, WinShock, FREAK o Logjam, among others. The acronym DROWN stands for Decrypting RSA with...
After the discovery of several vulnerabilities associated related to the SSL/TLS protocol in 2014 and the first trimester of 2015, in the middle of last May “Logjam”, was disclosed, a new vulnerability that affects the security of Internet communications. Let's analyze its impact in Spanish domains
We are getting closer to the second edition of CyberCamp, the cybersecurity event organised by INCIBE, which started last year with the aim of bringing together young talent in cybersecurity. This year, it will be held in the Barclaycard Center in Madrid between 26 and 29 November. To detect and identify the best talent in Spain, as in the last edition, we have organised a series of technical...