26/04/2016, by INCIBE. The use of the ZigBee protocol, both in industry and in public settings, for example in people’s homes, makes it a possible target where many attackers may focus their attention.
08/04/2016, by INCIBE. In December 2015 part of the electricity sector in Ukraine was attacked by the Trojan BlackEnergy. This modular Trojan that allows different additional malware to be loaded left a million and a half people without electricity.
23/03/2016, by Santiago González (INCIBE). What is DROWN? DROWN is the name given to a new vulnerability linked to It is therefore a continuation of the trend that has appeared in recent years whereby diverse vulnerabilities have appeared which have a certain impact associated to Internet communication security, for example Heartbleed, POODLE, WinShock, FREAK o Logjam, among others. The acronym DROWN stands for Decrypting RSA with...
17/03/2016, by Miguel Herrero (INCIBE). In the popular Spanish comics series by the great artist and writer Ibáñez, Phil would become angry with Mort and chase him, normally with some disproportionately large weapon in hand, while Mort would run away in one of his many disguises. A scenario like the one above happens time and again in our operating systems, except that the malware is the character that puts on a disguise...
08/03/2016, by INCIBE. The industrial protocol Modbus is fairly widely used across different industrial sectors, as it is easy to implement and has a publicly available specification. In this article, the weaknesses of this protocol will be analyzed, as well as the countermeasures to take to mitigate these failings.
01/03/2016, by INCIBE. Malware on Android, Wi-Fi network security and Windows forensics are some of the topics that cybersecurity newcomers want to and need to know about. In any one of these fields it is crucial to understand how hackers work, to find out what vulnerabilities a device or programme has and, above all else, to know how to protect one's self.