Paloma Recuero de los Santos IoT and Big Data: What’s the link? The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
LUCA How Big Data helped Stuttgart improve commutes and tackle Climate Change Here at LUCA, we are passionate about harnessing the power of data to tackle problems. Whether the problem is a global threat like climate change or a personal issue...
Luis Simón Gómez Semeleder IoT Activation: the IoT Program for Startups Telefónica launches the IoT Activation program to help startups develop their Internet of Things products. Thanks to IoT Activation, companies will have access to Telefónica’s exclusive services and tools to...
Beatriz Sanz Baños Make your holidays run smoothly with IoT The arrival of summer holidays allows us to visit our favorite destinations, but who isn´t worried about losing their suitcase when travelling? Luckily, IoT help us to have everything...
Alfonso de la Rocha Gómez-Arevalillo The truth behind Libra, Facebook’s new cryptocurrency It’s been almost a week since Facebook’s public release of Libra Blockchain, a decentralized programmable database promoted by Facebook to support a low-volatility cryptocurrency. Opiniated rivers of ink have...
ElevenPaths #CyberSecurityPulse: Google’s project to fight election attacks On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
ElevenPaths #CyberSecurityPulse: PyeongChang Olympics: A New False Flag Attack? A postmortem of the Olympic Destroyer malware used in the PyeongChang Olympics attack reveals a deliberate attempt by adversaries to plant a false flags when it comes to attribution,...
ElevenPaths New plugins for FOCA: HaveIBeenPwned and SQLi Following the publication of Foca OpenSource, a lot of people are now enthusiatic about the idea of adding new plugins or improving existing ones. On...
ElevenPaths #CyberSecurityPulse: Biggest-Ever DDoS Attack Hits Github Website At the end of 2016, a DDoS attack on DynDNS blocked major Internet sites such as Twitter, Spotify and PayPal. The Mirai botnet was used to take advantage of...
ElevenPaths New tool: “Web browsers HSTS entries eraser”, our Metasploit post exploitation module This module deletes the HSTS/HPKP database of the main browsers: Chrome, Firefox, Opera, Safari and wget in Windows, Mac and Linux. This allows an attacker to perform man in...
ElevenPaths Evrial, malware that steals Bitcoins using the clipboard… and the scammed scammers Evrial is the latest cryptocoin malware stealer, and uses the power to control the clipboard as its strongest bet to get “easy money”. Elevenpaths has took a deep...
ElevenPaths #CyberSecurityPulse: Dude, Where Are My Bitcoins? Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
ElevenPaths SandaS GRC, the best way to perform the GSMA IoT Security Assessment SandaS GRC ElevenPaths SandaS GRC allows organizations to support their business strategy, improve operational performance, mitigate operational risks and ensure regulatory compliance. Is the perfect complement with which you can...
ElevenPaths #CyberSecurityPulse: Oops, I Went Running and I Published Information From Secret Locations The popular fitness tracking app Strava proudly published a 2017 heat map showing activities from its users around the world, but unfortunately, the map revealed locations of the United...
ElevenPaths Managed Detection & Response: Prevention is Not Enough, You Need to Become Cyber-Resilient You want your organization to be cyber-resilient but you have no means? You have advanced security solutions in place, but you lack skilled staff trained to take advantage of them? You...
ElevenPaths Tackling Cybercrime: Three Recommendations for 2018 In 2017 we saw ransomware variants such as Wannacry wreak havoc across computer networks in the UK. Not only were these variants of malware almost impossible to remove from...
Rocío Muñoz Paul How Telefonica has implemented the first automatized SDN network Much research and case studies have been put into the latest technologies as applied to telecommunications networks for automation and operational efficiency purposes aimed at the needs of future 5G networks and...
Olivia Brookhouse How to learn Python: the most important skill for employers The application of Artificial Intelligence to optimize Big Data and provide Data Insights is becoming a necessity to all business processes, therefore programmers are in hot demand. Designing effective...
LUCA The use of AI and Machine Learning in the beer industry Artificial Intelligence has made its way into so many crucial aspects of our lives whether it be in medical care, transport, or even catering, but there are also so...
LUCA How the fashion industry is applying Big Data and AI Season after season, retailers come up with loads of new products ready to hit shelves worldwide. While at one time, designers had no idea what their customers would like...
LUCA Machine Learning to analyze League of Legends Written by David Heras and Paula Montero, LUCA Interns, and Javier Carro Data Scientist at LUCA When League of Legends was released in 2009, few people could have predicted what...