Telefónica Tech Affordable fleet management for Spanish SMEs We live in a fast-changing environment. Spanish SMEs have sharpened their wits to stay in the business after the pandemic. Most of them have begun a process of digitalisation...
María Teresa Nieto Galán Facts and lies about the famous concept of NFTs The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
Telefónica Tech Cyber Security Weekly Briefing 19-25 March Privilege escalation vulnerability in Western Digital Independent security researcher Xavier Danest has reported a privilege escalation vulnerability in EdgeRover. It should be mentioned that EdgeRover is a software developed by storage products...
Mark Skelton 3 Key Cyber Security Considerations To tackle cyber security effectively, we need to find new ways to meet the cyber challenges facing all of us. As CTO for Telefónica Tech UK&I, I regularly speak...
Sandra Tello Towards a green digital transformation COVID-19 has created challenges that were previously unimaginable, but it has also given us an incredible opportunity to reinvent and rebuild ourselves. In my last blog post we saw...
ElevenPaths Cyber Security Weekly Briefing 12-18 March Vishing by impersonating Microsoft The Office of Internet Security (OSI) has issued a security advisory to report an increase, in recent weeks, of fraudulent calls in which a supposed Microsoft...
Telefónica Tech's Innovation and Laboratory Area #CyberSecurityReport2021H2: Log4Shell, the vulnerability that has exposed the software’s reliance on altruistically maintained libraries and their enormous security impact. There are many reports on security trends and security summaries, but Telefónica Tech wants to make a difference. The Innovation and Lab team has just launched our own report...
Francisco Ibáñez González AI of Things (II): Water, a sea of data Water management companies have been adapting the way they manage their processes according to the evolution, costs and availability of technology in each part of their value chain. It...
Lucía López Sánchez Are airlines companies as safe as they seem? Recently, the number of news reporting cybersecurity incidents involving airlines companies worldwide has increased; cybercriminals are targeting airlines more and more often. Some examples of these incidents are the...
Telefónica Tech Telefónica Tech at Mobile Word Congress 2022 MWC 2022 was undoubtedly one of the busiest in recent years. With the post-pandemic halt and the rescheduling of MWC 2021, even though it was only 6 months since...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick Latch, new ElevenPaths' service During the time we’ve been working in ElevenPaths we’ve faced many kind of events internally, buy one of the most exciting and awaited is the birth of Latch. It’s a technology of our...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...