Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • Say goodbye to traffic jams Who says your pet can not become an influencer?
  • Big Data
    • When will Robots find a place in the Smart Home? Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs
  • Cybersecurity
    • New tool: Neto, our Firefox, Chrome and Opera extensions analysis suite In search of improved cryptocurrency privacy with Dash, Zcash and Monero
Think Big / Business
  • Big Data & AI
    • Olivia Brookhouse

      When will Robots find a place in the Smart Home?

      With the mass introduction of smart speakers, smart doorbells, smart fridges and even smart toilets there is a world of possibilities when it comes to innovating our homes. Whilst...
      LUCA

      Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs

      Cell phone data usage has been on a steady increase over the last several years. However, in certain areas of the world such as Latin America, that usage has...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      Say goodbye to traffic jams

      The hours that we lose in traffic jams in big cities would be better used in what really matters to us thanks to the Internet of Things. We are talking...
      Beatriz Sanz Baños

      Who says your pet can not become an influencer?

      Currently, 40% of Spanish households own a pet, according to the Madrid Association of Pet Veterinarians. That’s about 20 million dogs, cats, birds or hamsters that brighten the lives...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      New tool: Neto, our Firefox, Chrome and Opera extensions analysis suite

      In the innovation and laboratory area at ElevenPaths, we have created a new tool which is used to analyze browser extensions. It is a complete suite (also extensible with...
      ElevenPaths

      In search of improved cryptocurrency privacy with Dash, Zcash and Monero

      When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Sergio De Los Santos

Innovation and Labs Leader at ElevenPaths. He holds a bachelor’s degree in Computer System Engineering and a master’s degree in Software Engineering and Artificial Intelligence from the University of Málaga.



The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong
Sergio De Los Santos

The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong

All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
Tell Me What Data You Request from Apple and I Will Tell You What Kind of Government You Are
Sergio De Los Santos

Tell Me What Data You Request from Apple and I Will Tell You What Kind of Government You Are

We recently found out that Spain sent 1,353 government requests for access to Facebook user data in the first half of 2020. Thanks to Facebook’s transparency report for the...
A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio De Los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
How Traditional CA's Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store
Sergio De Los Santos

How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store

It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Pay When You Get Infected by Ransomware? Many Shades of Grey
Sergio De Los Santos

Pay When You Get Infected by Ransomware? Many Shades of Grey

The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and...
What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?
Sergio De Los Santos

What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?

We all know the security recommendations offered by professionals on malware protection. Frequently: use common sense (personally, one of the least applicable and abstract pieces of advice that can...
Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
Sergio De Los Santos

Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
OpenPGP: Desperately Seeking Kristian
Sergio De Los Santos

OpenPGP: Desperately Seeking Kristian

Open Source applications run on a server system that has never worked properly. Why does this happen?
More and shorter certificates with a lower lifetime: where is TLS going to?
Sergio De Los Santos

More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
Apple introduces up to 14 signatures in XProtect given the malware flood for Mac
Sergio De Los Santos

Apple introduces up to 14 signatures in XProtect given the malware flood for Mac

What is Apple doing about Shlayer malware? We analyze the main tools that MacOS is using to face this threat.

Navegación de entradas

Volver a portada
1 2
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Patrick Buckley
How IoT technology is helping candy producers make sweet profits!
From chocolate bars to lollipops, gumdrops to Haribos, the confectionary industry is now worth an estimated 210$ billion worldwide. With the industry experiencing strong growth, it is no surprise...
WhatsApp terms and conditions update - a cheeky move?
Carlos Ávila
WhatsApp Terms and Conditions Update: A Cheeky Move?
Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data,...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths
How the “antimalware” XProtect for MacOS works and why it detects poorly and badly
Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility