LUCA A formula for Victory: Big Data in Formula 1 Japan 1990, most die-hard Formula 1 fans remember the eventful race in Suzuka circuit. As was usual during the late 80’s and early 90’s, Ayrton Senna and Alain Prost,...
LUCA Do not miss what happened at NID 2018: WE ARE IN Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
Beatriz Sanz Baños Medical video assistance thanks to IoT Much has been said about the arrival of Internet of Things in numerous sectors such as industry, home automation or even leisure, but little, however, of its application to...
Beatriz Sanz Baños Barcelona, Singapore and Amsterdam: sustainable cities thanks to Internet of Things Thanks to IoT technology, we can imagine cities that are increasingly sustainable and intelligent. By installing IoT devices in different parts of the city, communicating with each other and collecting data...
ElevenPaths #CyberSecurityPulse: The eternal dispute: backdoors and national security A bipartisan group of legislators from the house of representatives has introduced a piece of legistation which will prevent the federal government of the United States from demanding companies...
ElevenPaths Cybersecurity Shot_MUPOL Information Leakage Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick Showing certificate chain without validating with Windows "certificate store" (C#) Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Florence Broderick White Paper: Practical hacking in IPv6 networks with Evil FOCA We have released a white paper about practical hacking in IPv6 networks with Evil FOCA. This document describes IPv6 basic concepts, most common IPv6 current attacks and how to implement...
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Florence Broderick Mobile banking and banking trojans During 2012 there was an increase around 28% in mobile banking or M-Banking operations. Users can access their bank accounts from their mobile devices, mainly making use of a specifically...
Florence Broderick (re) Introducing Evil Foca (DEFCON Edition) Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Florence Broderick FaaS: Visión global de Pentesting by Design La idea que tenemos sobre seguridad es diferente sobre lo que históricamente las organizaciones han ido utilizando. ¿Realmente es lo que necesitaban? Pensamos que un sistema continuo de pentesting...
Florence Broderick Eleven Paths is growing Eleven Paths is growing. Apart from the people who joined from the beginning (just two months ago!), we’ve been hiring new employees that will have a key role in...
Florence Broderick Security should be transparent, but ready when needed Security should be totally transparent for users; this was one of the key messages we discussed last week during the press conference we did with several journalists when launching Eleven...
Rocío Muñoz Paul How Telefonica has implemented the first automatized SDN network Much research and case studies have been put into the latest technologies as applied to telecommunications networks for automation and operational efficiency purposes aimed at the needs of future 5G networks and...
Olivia Brookhouse How to learn Python: the most important skill for employers The application of Artificial Intelligence to optimize Big Data and provide Data Insights is becoming a necessity to all business processes, therefore programmers are in hot demand. Designing effective...
LUCA The use of AI and Machine Learning in the beer industry Artificial Intelligence has made its way into so many crucial aspects of our lives whether it be in medical care, transport, or even catering, but there are also so...
LUCA How the fashion industry is applying Big Data and AI Season after season, retailers come up with loads of new products ready to hit shelves worldwide. While at one time, designers had no idea what their customers would like...
LUCA Machine Learning to analyze League of Legends Written by David Heras and Paula Montero, LUCA Interns, and Javier Carro Data Scientist at LUCA When League of Legends was released in 2009, few people could have predicted what...