Fernando García Gómez Waste collection vehicles join the RevolutIOTn What’s the impact of technology in our lives? Undoubtely, it makes our daily life easier both in the personal and profesional field, allowing us to obtain more benefits with less...
Beatriz Sanz Baños How do brands speak to you? Internet of Things gives companies a world of possibilities to improve their productivity, management and service they offer to their clients. This last section is especially important in Retail, where...
Luis Simón Gómez Semeleder Now cycling is safer thanks to drones and IoT How many of us don’t feel safe overtaking a bike on the road? The truth is that while driving a car we could be presented with a dangerous situation,...
Beatriz Sanz Baños New Business Opportunities with IoT IoT combines virtual and real worlds for smart devices to generate a wealth of information, such that objects can act without human intervention. One way or another, the development of...
María Cascajo Sastre 10 features that the city of the (near) future will have The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...