ElevenPaths Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’ In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for one detail: their lack of...
Olivia Brookhouse Would you let Artificial Intelligence run Christmas? Artificial Intelligence and Big Data are transforming the workplace, providing real time insights to optimize decision making. Meanwhile at home, AI embedded home devices and online applications can accurately...
Beatriz Sanz Baños The trip experience starts at the airport Madrid, December 6, 2019, 11:00 a.m. César starts his vacation today. He is very excited because it will be the first time he travels to Asia. He begins an exciting...
Sarah Rojewski Transformation of customer service and sales in Germany with Aura I was invited to the event “Women in AI & Data” organized by databricks and hosted by Microsoft in Munich. It seems like a trendy topic but the founder...
AI of Things Success Story: LUCA Transit and Highways England The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
AI of Things Success Story: Using Big Data to improve Tourism with Iberostar In today’s data story, we talk about some of the main applications of Big Data and Artificial Intelligence within the tourism sector. In this case, the hotel chain, Iberostar,...
AI of Things Artificial Intelligence in the Industrial Sector: the success story of Repsol Although technological advances have been left behind in recent years, the industrial sector presents opportunities for developpment in the field of Big Data and Artificial Intelligence, and also in...
Olivia Brookhouse The Big Data behind Black Friday It is often the products that seem to have “come out of nowhere” that suddenly experience rocket sales and have everyone talking. Whether its health fads such as...
Beatriz Sanz Baños The Smart mining revolution The integration of IoT in smart mining manages to connect its employees with their work environment, providing different benefits that reduce the percentage of accidents. Since its inception, safety has...
Sergio de los Santos New App to Clean Metadata More Easily We are not going to repeat the dangers of metadata, since it has been discussed for quite some time now. However, we can try to make its management and cleaning simpler. Some...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...