Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • What is the difference between M2M and IoT? What role will Data Governance play in the Digital Transformation after COVID-19?
  • Big Data
    • Artificial Intelligence: What even is that? Using Big Data to combat Air Pollution in Brazil
  • Cybersecurity
    • Rock appround the clock, our research in DEFCON Foca Files Finder, our new Chrome extension to feed FOCA
Think Big / Business
  • Big Data & AI
    • Richard Benjamins.

      Artificial Intelligence: What even is that?

      Artificial Intelligence (AI) is the hottest topic out there at the moment, and often it is merely associated with chatbots such as Siri or other cognitive programs such as...
      LUCA

      Using Big Data to combat Air Pollution in Brazil

      Content originally written by Raquel Carretero Juárez, for the Telefonica Public Policy Blog.   Telefónica Brazil is using mobile network Big Data to monitor air pollution in São Paulo (Brazil) and...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      What is the difference between M2M and IoT?

      Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
      LUCA

      What role will Data Governance play in the Digital Transformation after COVID-19?

      The current digital transformation process companies are facing is causing a deep cultural change in daily business tasks, organizational processes, business roles and competencies, in which making a good...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      Rock appround the clock, our research in DEFCON

      In the world of Threat Intelligence, determining the attacker’s geographical location of is one of the most valuable data for attribution techniques, even if not perceived like that, this...
      ElevenPaths

      Foca Files Finder, our new Chrome extension to feed FOCA

      Our Chrome extension is really simple. It takes advantage of the Bing technology (already used by FOCA) to perform a search of documents on the domain being visited at the moment...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Franco Piergallini Guida

Security Researcher. Innovation & Laboratory Area at ElevenPaths.



The First Official Vulnerabilities in Machine Learning in General
Franco Piergallini Guida

The First Official Vulnerabilities in Machine Learning in General

Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
Thinking About Attacks on WAFs Based on Machine Learning
Franco Piergallini Guida

Thinking About Attacks on WAFs Based on Machine Learning

One of the fundamental pieces for the correct implementation of machine and deep learning is data. This type of algorithm needs to consume, in some cases, a large amount...
Adversarial Attacks: The Enemy of Artificial Intelligence (II)
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence (II)

In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?

Navegación de entradas

Volver a portada
  • ElevenPaths
  • LUCA
  • IoT

Popular

Patrick Buckley
How IoT technology is helping candy producers make sweet profits!
From chocolate bars to lollipops, gumdrops to Haribos, the confectionary industry is now worth an estimated 210$ billion worldwide. With the industry experiencing strong growth, it is no surprise...
Curiosities About Windows XP Code Leak
ElevenPaths
Curiosities About Windows XP Code Leak
A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths
How the “antimalware” XProtect for MacOS works and why it detects poorly and badly
Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility