26/03/2015, by Antonio López (INCIBE)
The kernel-mode rootkits are one of the most fearsome threats because of their level of sophistication and difficulty of detection. Know how this type of rootkits in Linux systems work.
24/03/2015, by Álvaro Díaz Hernández
19/03/2015, by Miguel Herrero (INCIBE)
In information security, "air gap" is the name given to a network security measure consisting of physical isolation of one network from others that are considered insecure. This security measure is widely utilized in certain environments, such as industrial control systems, and government or defence networks. In fact, in industrial control systems air gaps were one of the most basic...
17/03/2015, by Francisco J. Rodríguez (INCIBE)
Advertising services offered by Google and other providers offer opportunities for income through advertisements on websites. Often these opportunities are exploited illegally to boost profits. Thanks to the honeypots in INCIBE, we have been identified campaigns that leverage this fraud through Cloud services. Here's an example.
11/03/2015, by INCIBE
Since the 80’s, experiments simulation has gained importance as a means for training. It can be said that this learning mechanism constitutes a tool allowing to undertake practices equivalent to real world situations, but safely and within a controlled setting. Applied to cybernetics, we can define a cyber exercise as a tool to assess the readiness of participants when facing cyber...
10/03/2015, by Asier Martínez (INCIBE)
As demonstrated by the data gathered in the Android malware situation report, Google’s operating system has become the mobile platform that is affected most by malware, encompassing 99% of threats developed for smartphones.