21/04/2015, by Jesús Díaz (INCIBE). Although steganography took longer than cryptography to come into the public eye (despite also having a long history behind it), it is now quite popular in the area of computer security. This post summarizes the steganographic technique known as LSB as well as the associated PoV steganalysis, including practical examples.
16/04/2015, by Antonio López (INCIBE). In previous papers have discussed the main types of rootkits in Linux and its operation. Some methods are described for this type of malware to hide and what you can do to try to detect them.
14/04/2015, by Jesús Díaz (INCIBE). The most known anonymizing network is, by far, Tor. Nevertheless, there are also alternatives. In this post, we summarize two of the main ones, I2P and Freenet, and reference other systems that have been relevant in the past (or may be important in the future).
09/04/2015, by David Cantón (INCIBE). As we have already mentioned previously, infrastructure attacks are those that focus mainly on layers three and four of the OSI model (ISO/IEC 7498-1) and application layer protocols that support communications, such as DNS or NTP. This is the most frequent type of attack and, as illustrated in the following graphic, makes up 90% of the DDos attacks detected by Akamai in the fourth quarter of...
08/04/2015, by Antonio López (INCIBE). The malware in general and in particular botnets maintain a constant battle to operate through internet and avoid detection. Techniques like blacklisting domains and sinkholing are bypassed with various countermeasures. Let's talk about domain, a recent mechanism of evasion.
31/03/2015, by Francisco J. Rodríguez (INCIBE). Mentioning that our services/systems that are published on Internet are exposed to a number of attacks on a daily basis is nothing new. As a result, here is a need to protect the exposure of our services/systems in order to minimize the risks of attacks or intrusions.