Olivia Brookhouse Autonomous Vehicles: when will they be a reality? It seems like we’ve been waiting years for autonomous vehicles, with big corporations promising “next year” every year. In 1925 Francis Houdina paraded the first radio-controlled car around the streets of...
Diego Martín Moreno Blockchain technology In the previous article we talked about the basic concepts of the blockchain, and now we will focus on the current technologies to implement a blockchain solution. Blockchain and Smart...
Álvaro Alegría Don’t give up on human intelligence while adopting the artificial one Artificial intelligence is here to stay, that’s for sure. Just look at the pink (and not that pink) pages of any newspaper or take a quick look at Linkedin’s...
Diego Martín Moreno What are Blockchain and Smart Contracts? Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
AI of Things Blockchain and IoT predictions for 2019 Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
Paloma Recuero de los Santos Python for all (5): Finishing your first Machine Learning experiment with Python We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
AI of Things Machine Learning identifying rare genetic disorders Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces? The quantity of genetic illnesses is so...
Paloma Recuero de los Santos Python for all (4): Data loading, explorative analysis and visualisation Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
Paloma Recuero de los Santos Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need? We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries. We will see what purpose some of them...
Paloma Recuero de los Santos Python for all (2): What are Jupyter Notebooks? What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...