31/05/2016, by Asier Martínez (INCIBE). The following article shall outline the most significant technical specifications of the main mobile platforms. Accordingly, the 4 most widely used mobile platforms are going to be taken into account based on their market share: Android, iOS, Windows Phone and BlackBerry OS, with a global distribution as follows.
12/05/2016, by Miguel Herrero (INCIBE). If Pliny The Elder had lived in our times and worked in malware analysis, his proverb most likely would have looked like the title of this post. As malware evolves, the techniques used to hide it within the operating system constantly become more sophisticated. It can be hidden deep in the hard disk or hidden in plain sight in the hope that it will not be discovered, or it can be disguised....
05/05/2016, by INCIBE. The attack on the Ukrainian power grid has caused a lot of commotion at the global level. These kinds of attack on control systems are highly targeted and planned, but is there anything we can do to prevent them?
26/04/2016, by INCIBE. The use of the ZigBee protocol, both in industry and in public settings, for example in people’s homes, makes it a possible target where many attackers may focus their attention.
08/04/2016, by INCIBE. In December 2015 part of the electricity sector in Ukraine was attacked by the Trojan BlackEnergy. This modular Trojan that allows different additional malware to be loaded left a million and a half people without electricity.
23/03/2016, by Santiago González (INCIBE). What is DROWN? DROWN is the name given to a new vulnerability linked to It is therefore a continuation of the trend that has appeared in recent years whereby diverse vulnerabilities have appeared which have a certain impact associated to Internet communication security, for example Heartbleed, POODLE, WinShock, FREAK o Logjam, among others. The acronym DROWN stands for Decrypting RSA with...