Beatriz Sanz Baños Your children’s toys are now connected Smartwatches, drones, lights controlled from our mobile or connected scooters are already a reality in our everyday life. Connectivity and data storage have been gradually taking over the consumer...
Olivia Brookhouse When will Robots find a place in the Smart Home? With the mass introduction of smart speakers, smart doorbells, smart fridges and even smart toilets there is a world of possibilities when it comes to innovating our homes. Whilst...
Luis Simón Gómez Semeleder Now cycling is safer thanks to drones and IoT How many of us don’t feel safe overtaking a bike on the road? The truth is that while driving a car we could be presented with a dangerous situation,...
Beatriz Sanz Baños Smart gas stations and how to find them In the last few years, gas stations started to offer travelers a wide range of possibilities beyond mere refueling. This increases competition between service stations, which is forcing these...
María Cascajo Sastre 10 features that the city of the (near) future will have The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...