Home / Segmented / Development

Development

This section provides content of interest to professionals who handle different programming languages, development environments, tools to ensure security, code analysts and auditors, cryptographers, or specialists in reverse engineering and malware.

Sweyntooth: Bluetooth in the spotlight

SweynTooth: Bluetooth in the spotlight

Posted on 12/17/2020, by INCIBE
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.
INCIBE-CERT technical webinars

INCIBE-CERT technical webinars

Posted on 09/24/2020, by INCIBE
With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.
Spoofing jamming GNSS

Spoofing and jamming over GNSS

Posted on 07/09/2020, by Victor Rivero Díez (INCIBE)
GNSS (Global Navigation Satellite System) technology is deeply integrated into society to meet geolocation and time measurement needs; it is considered one of the most reliable and it is a critical element for certain industrial sectors. However, due to the advancement of the technology and its widespread use, GNSS are being compromised by cybercriminals.
IMC ANTICIPATING

ANTICIPATING: one of the four goals of cyberresilience

Posted on 06/11/2020, by INCIBE
Anticipating is one of the four aims of cyberresilience. It consists of maintaining a state of informed readiness, in order to prevent essential services from being compromised in the event of a cyberattack. To measure the objectives of this aim, its three functional domains are analysed: cybersecurity policies, risk management and cybersecurity training.

Pages