Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Security tools started to be used in corporate environments many years ago. However, control systems are just now starting to use them, taking full advantage of the lessons learned in corporate environments.
The most widely used framework for vulnerability scoring, the CVSS (Common Vulnerability Scoring System ) has been updated incorporating improvements in a new version: CVSS 3.0
We are getting closer to the second edition of CyberCamp, the cybersecurity event organised by INCIBE, which started last year with the aim of bringing together young talent in cybersecurity. This year, it will be held in the Barclaycard Center in Madrid between 26 and 29 November.
To detect and identify the best talent in Spain, as in the last edition, we have organised a series of technical...
Security errors
SSL (along with its TLS evolution) is the most used cryptographic protocol in its different implementations to guarantee the confidentiality of communications on Internet. This is achieved by ciphering, via asymmetrical cryptography algorithms, the communications between the client (usually the user’s web browser) and the server it gains access to. When a website is shown using...
In a previous article about basic access control mechanisms in systems security we introduced Mandatory Access Control (MAC) as a more accurate mechamism than basic access control. Now we are talking about of SELinux as an example of Mandatory Access Control.
Among the activities INCIBE has organised for the CyberCamp event to find new cyber-security talents are a wide range of Security Challenges which you can take part in to find out what it is that really fires your inspiration.
The challenges are made up of two stages, one online and the other at the event itself. You can take part in the online stage, which will be open from 7 to 16 November ...
One of the activities included in the Plan for Trust in Digital Life (Plan de Confianza en el Ámbito Digital) is the celebration of an event aimed at focusing the interest of all audiences towards this discipline, so important in our daily lives. The venue, organised by INCIBE will take place from 5 to 7 December, 2014, and will be held in the Pabellón Multiusos I of Madrid.
As we want this...
Android is an operating system that is fragmented into various versions. This fact, combined with differing screen sizes and resolutions, has been a real headache for developers over the last few years.
With the announcement of the new fingerprint sensor in the latest smartphone from Apple, the iPhone 5S, biometric sensors are again under scrutiny among information security professionals.
Especially because the use of these technologies is becoming popular for consumer grade electronics, and its use use could become ubiquitous for something made to protect sensitive data, like information...