Home / Blog / Filtro / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
OWASP Testing Guide v4.0.

OWASP Testing Guide v4.0. A Guide to Security in Web Applications

Posted on 10/15/2014, by Antonio López (INCIBE)
The OWASP Foundation has updated its safety guide development, OWASP 4.0. Work of free distribution of high quality and prestige is already a reference for developers and auditors in the development of secure web applications. The OWASP foundation updates His guide to web development security, OWASP 4.0.
Botnets through packet analysis

Detection of botnets through packet analysis

Posted on 10/08/2014, by David Cantón (INCIBE)
Botnet detection has become a priority in the sector of computer security. In this article we will see one of the main techniques of detection: packet analysis
Abuse of DNS

Use and Abuse of DNS

Posted on 10/02/2014, by Antonio López (INCIBE)
DNS is a protocol present in almost all network communications and therefore very attractive as a tool of attack and / or distribute malicious software such as viruses, botnets and malware. In this article some both offensive and defensive strategies based on the use of DNS are briefly outlined.
SHA1

It is time for replacing SHA1

Posted on 09/25/2014, by Jesús Díaz (INCIBE)
Microsoft and Google have begun to press Certification Authorities towards abandoning SHA1 as the default cryptographic hashing for issuing digital certificates in favour of the more secure family SHA2. In this post, we will see how does this measure affect the main web sites and we will review its causes and consequences.
Fingerprint

The issue of biometrics as an authentication method

Posted on 09/25/2013, by Antonio Rodríguez (INCIBE)
With the announcement of the new fingerprint sensor in the latest smartphone from Apple, the iPhone 5S, biometric sensors are again under scrutiny among information security professionals. Especially because the use of these technologies is becoming popular for consumer grade electronics, and its use use could become ubiquitous for something made to protect sensitive data, like information...

Pages