Beatriz Sanz Baños Who says your pet can not become an influencer? Currently, 40% of Spanish households own a pet, according to the Madrid Association of Pet Veterinarians. That’s about 20 million dogs, cats, birds or hamsters that brighten the lives...
Beatriz Sanz Baños The heart of the airports pumps with IoT The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
Beatriz Sanz Baños IoT and everything under control With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Beatriz Sanz Baños Efficient and responsible milk production We have a new example of how technology can help us form a better society in which the production and consumption of milk is carried out in a sustainable...
María Cascajo Sastre 10 features that the city of the (near) future will have The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...