30/04/2015, by María José Santos (INCIBE). The fight against crimes involving sexual abuse of minors over the Internet is complicated. The techniques used by sexual abusers are becoming more and more sophisticated, and in consequence the risks to minors are growing. To this must be added the fact that the children affected often feel intimidated and do not report the situation.
28/04/2015, by Santiago González (INCIBE). Continuing with the trend initiated during 2014, new vulnerabilities associated with the protocol SSL/TLS are being published with relative frequency, a protocol which is habitually used as a mechanism to guarantee communication confidentiality in Internet. One of the latest vulnerabilities to be discovered at the beginning of last March is the so called "FREAK" (Factoring attack on...
21/04/2015, by Jesús Díaz (INCIBE). Although steganography took longer than cryptography to come into the public eye (despite also having a long history behind it), it is now quite popular in the area of computer security. This post summarizes the steganographic technique known as LSB as well as the associated PoV steganalysis, including practical examples.
16/04/2015, by Antonio López (INCIBE). In previous papers have discussed the main types of rootkits in Linux and its operation. Some methods are described for this type of malware to hide and what you can do to try to detect them.
14/04/2015, by Jesús Díaz (INCIBE). The most known anonymizing network is, by far, Tor. Nevertheless, there are also alternatives. In this post, we summarize two of the main ones, I2P and Freenet, and reference other systems that have been relevant in the past (or may be important in the future).
09/04/2015, by David Cantón (INCIBE). As we have already mentioned previously, infrastructure attacks are those that focus mainly on layers three and four of the OSI model (ISO/IEC 7498-1) and application layer protocols that support communications, such as DNS or NTP. This is the most frequent type of attack and, as illustrated in the following graphic, makes up 90% of the DDos attacks detected by Akamai in the fourth quarter of...