Telefónica Tech Cyber Security Weekly Briefing 15–21 january Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero Deep Learning in Star Wars: May Computation Be With You Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Carlos Martínez Miguel Artificial Intelligence 2022: myths and realities We are only in the early stages of AI development, but its impact is already huge When making predictions in the technological field, it is always advisable to start by...
Antonio Ramírez The digitisation of predictive technology: digital twins I still remember talking to my colleague Miguel Mateo after his presentation at the Telefónica Tech stand at MWC21 (Mobile World Congress 2021) about how the union of Predictive...
Telefónica Tech Cyber Security Weekly Briefing 28-31 december Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...
Telefónica Tech Cyber Security Weekly Briefing 18 – 24 December Log4Shell Vulnerability (update) Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1...
Jorge González How can we make water consumption more efficient? Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient. Water...
Emilio Moreno 2021: the year Edge Computing came into our lives As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Alexandre Maravilla Onboarding and biometric authentication to fight online fraud Online fraud has experienced a significant growth since the early 2020s pandemic accelerated the digital transformation of businesses and citizens. This is evidenced by the latest report from the...
Telefónica Tech Cyber Security Weekly Briefing 11 – 17 December New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick Latch, new ElevenPaths' service During the time we’ve been working in ElevenPaths we’ve faced many kind of events internally, buy one of the most exciting and awaited is the birth of Latch. It’s a technology of our...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...