5 jobs that you didn’t know used Data Science

AI of Things    24 January, 2018
Content originally written by Ane Urain Gurruchaga, LUCA Brand Awareness.

From taking the metro, to choosing a film that best fits your tastes, the presence of data is undeniable in many areas of our lives. However, there are some professions that you never would have associated with the use of data. Have a read of this list of 5 jobs that use Data Science, had you thought of them before?

1. Professional Sports

If you are aware of LUCA’s Big Data for Social Good (BD4SG) area, then you’ll know that sports such as cycling generate millions of data points in a single race/match. This data carries useful information for both the cyclist and their team, and helps to analyze each race, predict what will happen, and develop a better race strategy. The same can be said for eSports, where the data generated can be used to extract insights that can help analyze the players’ strengths and weaknesses, understand what has happened in a match, and in this way improve results and performance. You no longer have to be dreaming to say that data can contribute to improving the performance of professional sportsmen and women. One could even argue that data analysis is a vital part of sports, according to ex-NBA player Shane Battier it “changed the course of his career”.
Photo showing a group of Movistar Team cyclists.
Figure 1 : Movistar Team use Big Data to analyze, predict and strategize their races.

2. Movie Stars

Famous actors such as George Clooney and Jennifer Lawrence also run into data during their careers. In fact, casting actors for new films often relies of data from films and TV shows of the past. By combining reviews from well-known sites such as IMDB and Rotten Tomatoes with data from fan sites and the box office, casting teams can discover which actor best suits their new release. As we showed in a previous post, Netflix is a perfect example of how Big Data can be applied in the entertainment industry. As they are one of the most used platforms, they are able to easily analyze the tastes of each of their users and suggest shows and movies based on these preferences. Netflix even produced 10 different trailers for one of their shows so that they could better target the audience.

3. Security

Yes, the police also make the most of data for their job. Big Data already contributes to the daily prevention of crime. Bearing in mind that every arrest, police report and emergency call made each day generates data, it is possible to determine areas of high and low risk. In this way, the police can focus the areas where crime most regularly occurs. One can even evaluate the performance of police agents. For example, in LUCA’s BD4SG area, we carry out “Citizen Safety” projects such as the one alongside the Columbia University in order to predict the most likely places of delinquency in New York.
Picture of a stationary police patrol car.
Figure 2 : Police forces can use data science to map high and low risk areas in their cities.

4. Journalists

Journalists can’t be missed off this list. In recent years, “data journalism” has become a commonly heard term. It refers to the tendency of journalists using data to find out which type of articles are most interesting readers at the time, among other things. Big Data can also be used to find a fair value for an article, by using (for example) the number of times it has been liked or shared online. All of this can incentivize journalists to create more relevant content for their audience and to capture new readers.

5. Medical Professionals

Doctors can also benefit from Big Data in a variety of ways. For example, data can help achieve a more precise diagnostic, make informed decisions and prevent illnesses. It can also be helpful in the pharmaceutical sector, since Big Data can contribute to important research to fight diseases such as cancer. At LUCA for example, we worked on the UN Global Pulse project to predict the spread of diseases such as Dengue and Zika in Colombia and Brazil. We also collaborated with Unicef in their Magic Box project, aimed at preventing epidemics such as Ebola in western Africa. This shows that Big Data doesn’t just benefit various sectors of business, but also society as a whole.

Photo of a group of doctors in an operating room.
Figure 3 : Data science helps doctors make more accurate diagnoses.
To keep up to date with the latest news, check out our website, and don’t forget to follow us on TwitterLinkedIn and YouTube.

#CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

ElevenPaths    23 January, 2018

As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80 bytes) that is usually used to timestamp information taking advantage of the fact that the Bitcoin network is distributed and replicated throughout the network. Numerous projects are used to create use cases to certify that something has happened as the Proof of Existence project, validate academic certificates or even publish the orders to execute the infected nodes inside a botnet. However, did you know what was the technique used before 2013 to store information in the blockchain?

In this sense, the Bitcoin addresses were used (and still are used). At the end, an address does not stop being a text string encoded in Base58Check that contains useful data of up to 20 bytes in length relative to the hash of the public key associated with the address. Knowing this, small quantities were sent to these arbitrarily generated addresses, and therefore, no known private key. This has the consequence that the balance sent to those addresses for which the private key is not available will not be able to be spent, but at least it guaranteed that the operations will be stored in the chain of blocks.


Knowing this, we propose a challenge. Go to the next transaction and try to identify the address that starts with ’15g’. Next, check if it is a valid address (it should be because it is in the blockchain of Bitcoin!). And then try to decode it from Base58 to hexadecimal. And finally, decode it from hexadecimal to ASCII characters. Would you know what information was stored in that transaction issued five years ago?

The way to store information in a blockchain has evolved over time based on the needs of developers. But also here many times the debate goes from being technical to philosophical. The new functionalities have also generated much debate about the way forward since the adoption of these new features have implications that may question the original meaning of some projects. Consensus is not always possible.

Top Stories

The US Global Surveillance Bill Has Been Signed by President Trump

The U.S. legal framework related to the domestic surveillance has been signed by President Trump one day after the Senate approved it with 65 votes against 34. Privacy advocates and civil rights have a long criticized the Section 702 of the Foreign Intelligence Surveillance Act (FISA) that allows US intelligence agencies to conduct domestic surveillance under certain conditions without a warrant. The Section 702 allows the NSA to conduct warrantless spying of foreigners located abroad, including any communications with US citizens.

More information at House.gov

Russia-linked hackers targeting US Senate

Russian hackers from the group known as Fancy Bear are targeting the U.S. Senate, according to Trend Micro. Beginning in June 2017, phishing sites were set up mimicking the ADFS (Active Directory Federation Services) of the U.S. Senate. By looking at the digital fingerprints of these phishing sites and comparing them with a large data set that spans almost five years, they could uniquely relate them to a couple of Pawn Storm incidents in 2016 and 2017. Attribution is extremely tricky in the world of cybersecurity, where hackers routinely use misdirection and red herrings to fool their adversaries. But Tend Micro, which has followed Fancy Bear for years, said there could be no doubt.

More information at TrendMicro

Rest of the Week´s News

Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware

FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since early 2016 and provides myriad sophisticated capabilities. Zyklon is a publicly available, full-featured backdoor capable of keylogging, password harvesting, downloading and executing additional plugins, conducting distributed denial-of-service (DDoS) attacks, and self-updating and self-removal.

More information at FireEye

Skype Finally Adds End-to-End Encryption for Private Conversations

Dubbed Private Conversations, the new feature which is about to be introduced in Skype will offer end-to-end encryption for audio calls, text, and multimedia messages like videos and audio files. Private Conversations is already available to the Skype Insider program—a platform that allows Skype users to test new features before they rolled out to the rest of its over 300 million of users worldwide.

More information at Microsoft

Triton Malware Exploited a Zero-Day Flaw in Schneider Triconex SIS Controllers

In December 2017, a new malicious code dubbed Triton malware was discovered by researchers at FireEye. The industrial giant Schneider discovered that the Triton malware exploited a zero-day vulnerability in Triconex Safety Instrumented System (SIS). Initial analysis conducted by Schneider excluded that hackers may have leveraged any vulnerabilities in the target products, but now the vendor has discovered that Triton malware exploited a flaw in older versions of the Triconex Tricon system.

More information at Security Affairs

Further Reading

Nearly Half of the Norway Population Exposed in HealthCare Data Breach

More information at The Hacker News

Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely

More information at Chromium

A Hospital Victim of a New SamSam Ransomware Campaign Paid $55,000 Ransom

More information at Security Affairs

Enhancing customer experiences with Smart Digits.

AI of Things    22 January, 2018
On November 21st 2017, we hosted a webinar about accelerating the digital transformation with LUCA’s Smart Digits product portfolio. Smart Digits is a B2B platform and set of secure REST-based API services that allow access to unique, personal, data insights. Service providers can use these insights to transform and enhance their customer experiences and user journeys, while at the same time improving security and reducing fraud.

Uniquely, the Smart Digits insights are always bound to a mobile phone number, which in turn links to a person’s identity. Given that there is nearly 100% penetration of mobile phones globally, we can offer insights at scale. The LUCA Smart Digits products comply fully with the Telefónica data principles of security, transparency and empowerment. The products are also GDPR ready and can operate under a number of lawful data processing bases depending upon the product, use-case and territory.
Telefónica is leading a collaboration, along with the GSMA of global mobile operators to develop identity and attribute products and services, under the framework of Mobile Connect. Our ambition, in collaboration with other Telcos, is to have Mobile Connect aligned identity services available across all mobile operators in the markets where we operate. This will offer excellent product coverage across mobile operators for local and global service providers wishing to consume our products.
A view from space of Earth at night.
Figure 1 : Mobile Connect from Telefónica aims to bring identift services to operators all over the world.

Service providers in many different verticals can use Smart Digits to both improve the customer experience as well as improving levels of security. In the webinar, we introduced four products from the portfolio:

  1. LUCA Account Takeover Protection to allow SPs to make better informed risk decisions when using mobile channels for one-time passwords
  2. LUCA Verify to verify the end user’s mobile number instantly and securely via the mobile network
  3. LUCA Match to verify end user data, for example name and address
  4. LUCA Sign-Up to allow faster and easier form filling on mobile devices for consumers
Bringing it all together, we presented one digital transformation case study where we can help credit card issuers reinvent the customer experience for credit card applications via mobile devices. Today, when applying for a credit card on a mobile device, the application form can take a long time to complete, especially so on a small screen with a small keyboard. Even if the customer enters all their information successfully on the application form and the credit card application is approved they still need to wait 1-2 weeks normally to receive their new credit card.

Image of a credit card being used to make an online purchase.
Figure 2 : The Smart Digits portfolio can help customers save time when applying for a credit card online.
By using LUCA Verify, LUCA ATP and LUCA Sign-Up we can help credit card issuers transform their mobile credit card application experience while also maintaining high levels of security. Through LUCA Verify and LUCA ATP, the card issuer can verify the mobile phone number and check the mobile account has not been compromised, quickly and seamlessly. By using LUCA Sign-Up and with the consent of the customer, the application form can be pre-filled with customer data held by Telefónica and making the whole application process faster and more secure. Finally, thanks to the additional identity checks and reduced risks, card issuers can now issue a digital credit card straight to the digital wallet on the customer’s smartphone, allowing them to start spending right away, just 5 minutes after their successful application. Of course, the physical card will still follow in the mail 1-2 weeks later.
LUCA is working with leading global brands to integrate our Mobile Connect aligned Smart Digits products to help them transform their digital experiences while maintaining high levels of security, benefiting our B2B Enterpise customers and over 300m O2, Movistar and Vivo customers across the Telefónica footprint.
Content originally written by Daniel Torres Laguardia, Head of Scoring at LUCA, and Glyn Povah, Head of Smart Digits at LUCA 
To find out more about Smart Steps, check out our website, and don’t forget to follow us on Twitter, LinkedIn and YouTube.

Fashion connected: the IoT revolution in the textile sector

Beatriz Sanz Baños    20 January, 2018

Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature, and show the feelings or mood of the wearer. Technology applied to fashion is a reality that advances at a vertiginous speed, but it is a bit too expensive. The athletic, labor and health fields are those who have embraced by the advances in connectivity applied to clothing and, although it is still early, it will spread to the general public and become a common sight in the streets as the fabrication becomes cheaper.

For example, in 2017 Levi’s and Google they conducted a large textile-technological bet with their model denim jacket Levi’s Commuter Trucker Jacket. The novelty is its compatibility and connectivity with the mobile phone. With its buttons and sensors, a simple tap on the jacket sleeve can activate the music player, take a call or get directions from Google Maps.

We have a closer example as it comes from a brand created by two Spanish engineers. The brand Wendumanufactures shirts with the ability to regulate the temperature between 20 and 40 degrees. The t-shirt, connected to a mobile device, is cooled or heated according to the data set by the user from their mobile device. It is specially designed for military use, law enforcement or other professionals who spend long hours outdoors.

Data exchange between clothes and mobile devices makes them able to take calls, regulate body temperature, and show the mood

There are even supplements that help prevent allergies, such as the scarves from Caroline Van Rentergherm, a young entrepreneur who realized that the masks used while riding her bike around Paris did not prevent his eyes didn’t prevent her eyes to weep or an itchy throat, she would always end up using her scarf to protect herself. She has launched the Be AWAIR application that reports on the air quality and users can customize it to receive notifications about how to prevent allergies. The next step is the launch of WAIR scarves, that filter the air and it also includes a sensor that analyzes air quality and changes its color when pollution is too high.

For those who love the sea there are two models that can be adapted to the needs of each user. The first is of the firm Spinali, Who brought Neviano2, the advanced version of his first connected swimsuit that directly integrates UV sensors and reports a “Cream Alert” that warns users that they need to renew their protection with a message to the mobile and even recognizes the location and recommended places to visit.

The second model is geared more adventurous surfers, it’s the intelligent neoprene “Wetsuit” Emerid enterprise that incorporates an emergency identification system that works with NFC technology enabling the suit to be located from the mobile phone.

Another company that has made interesting contributions to connected fashion is cute Circuit. It’s renowned in the market for digital wearables. Its products have been seen on stage with artists like U2 or Katy Perry. Their garments are made mostly with intelligent microelectronics fibers and avant-garde design. In addition, they monitor the social networks of those who wear them and they can control the illumination of the fabric from the mobile phone.

From the technological Korean giant Samsung arrives Samsung NFC smart suit. They have made it with Rogatis that allows the user to unlock their phone, exchange business cards digitally and configure the devices in the office and driving modes.

Finally, one cannot speak of intelligent clothing in Spain without mentioning the Madrid catwalk Samsung EGO that although started in 2006 as a parallel initiative to the Mercedes Fashion Week in Madrid, since 2013 it has gradually positioned itself as a referent in the connected fashion field, giving visibility to new talent.

Technology applied to fashion is a reality that advances at a vertiginous speed

The best example of this trend is the Spanish Constanza More, winner of the latest edition of Samsung EGO Innovation Project, with its Quantum project. The head of the firm has developed a form of emotional communication by light thanks to an application installed on the mobile phone. Thus, connected clothing can express feelings previously selected with patterns for positive emotions.

The Quantum collection consists of shirts, jackets, vests, pants, short dresses, silk and satin. To turn them into smart materials like methacrylate, plastic and anodized aluminum that is easy to connect with the mobile phone of the owner and configure them.

There are many possibilities that we currently have to be connected with what surrounds us; it stands to reason that clothes can’t be left behind. The technology allows us to connect our daily lives, improving our experiences of the day and gathering the best information about our routines to improve or modify them according to our needs.

Blockchain opportunities for IoT

Beatriz Sanz Baños    19 January, 2018

Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.

5 amazing things at CES 2018

Cascajo Sastre María    11 January, 2018

The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies in the sector. So what did we see at the most recent CES 2018? Below are just five examples of the great advances that will mark a turning point in our way of seeing technology. Assistants, artificial intelligence, autonomous cars and improvements in quality are in the spotlight in a scene where the Internet of the Things was omnipresent.

Smart headphones

It is clear that Sony does not want to be left behind in headphone development. For this reason, at CES 2018 we were able to see up to four different models. While until now, the quality of wired headphones has been the main factor, wireless headphones are showing an interesting improvement: the native incorporation of Google Assistant.

This will be accompanied by the general update of some of their older models, so the Japanese company is turning their headphones into veritable smart listening systems capable of offering not only better sound but also a range of services thanks to the IoT.

Television is now smart and in 8K

We are still getting used to resolution of 4096 x 2160 pixels, better known as 4K. But that is no reason why technology should not continue to advance, as we have seen at CES 2018, where the first uses of 8K, or 7680 x 4320 pixels, were unveiled. But this resolution would not be worth anything in itself were it not for artificial intelligence.

Samsung’s new model, the 88-inch QLED Q9, will be able to convert video to 8K thanks to the real-time use of artificial intelligence, which processes and rescales the images. All this power is joined by the conversion of simple televisions into smart TVs, which is already a natural integration, just as being connected to the Internet is a fact.

The race for smart assistants

Although virtual assistants have been filling the show for years, in 2018 they were especially the talk of the show. Voice assistants are probably one of the best examples of an IoT application at the service of the user. They provide information, allow you to manage events and make purchases, and much more.

Probably the most striking and interesting assistant at the fair was the Lenovo Smart Display, a speaker to which Lenovo and Google have added a small touch screen and the presence of Google Assistant. With this launch, Amazon Echo Show has gained a strong opponent, while users have gained more features.

The speaker will allow users to make and receive video calls, listen to music and get information about the traffic and weather, as well as having the functions needed to control a smart home. The Lenovo Smart Display will also have access to Google Maps and YouTube, in addition to Google, making this assistant probably the most advanced to date.

The first autonomous cars are here

One of the most striking initiatives we saw at this year’s CES was the testing of several BMW 5 Series cars equipped with Aptiv autonomous driving technology. Aptiv is the parent company of nuTonomy, both of which are allied with Lyft to carry out a plan for autonomous taxis.

For many years, Aptiv has been working on mapping the streets of Las Vegas, where CES 2018 was held, so they were very familiar with the service they were offering. In addition, at CES we saw several other proposals, such as the Toyota e-Palette, which aims to combine two technologies: electric motors and autonomous cars.

With these demonstrations, the fair became yet another showcase of what the future holds for us, as visitors were finally able to see an autonomous car, probably one of the best examples of what the IoT is capable of, circulating around the city with real “clients”.

The heart of autonomy

In addition to the launch of autonomous cars, the CES was also the scene where two surprising technologies closely related to the Internet of Things and autonomous cars were unveiled. The first one comes from Nvidia. The company unveiled the finishing touches on Xavier, a chip to manage everything related to its Drive XI platform, designed to govern autonomous cars.

The joint efforts of Drive IX and Xavier will allow vehicles to have functions that until now seemed difficult to apply massively in vehicles, such as gesture control and facial recognition, as well as the installation of a native virtual assistant and the recognition of natural language, without which IoT could not be implemented in cars.

On the other hand, Mobileye REM (Road Experiment Management) technology, which was purchased by Intel, will put two million autonomous vehicles in circulation on roads around the world in order to acquire data, make more detailed maps and, ultimately, improve the autonomous driving systems that will begin to be integrated in the future, as announced at CES 2018.

With REM, Intel aims to take the lead in the expansion of autonomous cars, as it controls a huge amount of unique information for the development of these cars. Could this be the starting signal we all expected? Of course, CES has always marked the beginning of a new technological stage, a stage in which IoT has been growing in prominence for years.

Leave a Comment on 5 amazing things at CES 2018

How Germany moves

AI of Things    9 January, 2018
Our colleagues in Telefonica NEXT have created, using mobility data, data analysis and big data, an interactive map that lets you visualize nationwide traffic flows. Cities, transport companies and other interest parties can obtain interesting insights on topics like commuter behaviour and morning departure times from anonymised mobile network data.
If you want to discover how Telefonica NEXT has brought life to the findings for mobility and transport planning in Hamburg, Berlin and Munich, continue reading this post (originally published in Telefónica NEXT web).

Mobility data, data analysis, big data – these terms are all rather abstract. With “So bewegt sich Deutschland” (How Germany moves), Telefónica NEXT has created an interactive map that takes the data and uses it to visualise nationwide traffic flows. The aim is to bring to life the findings for mobility and transport planning in Germany that cities, transport companies and other interest parties can obtain from anonymised mobile network data. Among other things, it includes regional insights on topics such as commuter behaviour and morning departure times for Hamburg, Berlin and Munich.
https://next.telefonica.de/so-bewegt-sich-deutschland
Figure 1: “How Germany moves-So bewegt sich Deutschland” interactive map
In Telefónica Deutschland’s normal operation, mobile network data is generated by over 48 million accesses. This happens as mobile phones communicate with mobile cell sites when using the internet or making calls. Telefónica Deutschland anonymises the around five billion data points generated every day using a three-level TÜV-certified process so that they can no longer be assigned to individual people.
The Telefónica Deutschland subsidiary analyses this data in order to learn about movement patterns in Germany, thereby delivering significant value added for areas such as transport planning. “Big data is an abstract topic. With ‘So bewegt sich Deutschland’, we have brought our anonymised data flows to life for the first time,” explains Jens Lappoehn, Managing Director for Advanced Data Analytics at Telefónica NEXT. “Our data visualisation illustrates what the Fraunhofer Institute for Industrial Engineering confirmed a year ago:

 “Anonymised mobile network data represents a valuable resource for mobility planning”

Early risers and commuters in Germany

According to calculations, 161 million journeys of more than two kilometres are taken on an average weekday in Germany. On the website, these movement flows are presented across an average week in an interactive graphic. Each of the moving droplets represents a sufficiently large group of travellers – this is relevant for data protection as well as for statistical purposes.
Telefónica NEXT also identifies when each of the German regions starts its day. The average departure time for Germany as a whole is half past seven in the morning. The data shows that people in the eastern half of the country down to Bavaria leave the house earlier than those in the west of the country. In terms of the individual federal states, people in Brandenburg and Saxony-Anhalt have the earliest average departure time at 6:56 a.m.
Figure 2: When München starts its day.
Residents of Mecklenburg-Western Pomerania have the longest average morning journey at 29.6 kilometres. The shortest average journey is recorded in Berlin (6.7 kilometres). Users of the website can enter their own postcode and see how early their neighbourhood starts the day. Different postcode areas can also be compared.
Another interesting aspect illustrated by the site is the different sizes of the catchment areas for major German cities. While people commute into Munich from a surrounding area that is clearly defined, those commuting into Hamburg travel far greater distances, including from regions such as Mecklenburg, Prignitz and Western Pomerania. The average Hamburg commuter covers a distance of 28.9 kilometres to reach their workplace.

How Germany moves map
Figure 3: Size of catchment areas.
These are just a few examples of how anonymised mobile network data can be used in transport planning, thereby benefiting those in charge of public transportation and urban planning as well as developers of new forms of mobility. Telefónica NEXT’s data pool is already being used in numerous projects. These include the “ProTrain” project for the optimisation of regional transport capacities in Berlin-Brandenburg, which is supported by the German Federal Ministry of Transport and Digital Infrastructure.

How the data is created

Based on anonymised mobile network data from Telefónica Deutschland, Telefónica NEXT prepared a comprehensive origin-destination matrix for the whole of Germany. Information on the origin and destination of journeys of more than two kilometres within Germany was recorded in March 2017. Telefónica NEXT then evaluated the anonymised data for each hour and each postcode. All of the data takes the form of extrapolated values, i.e. they are projected for the entire German population.
Telefónica NEXT also worked out the respective means of transport. A distinction was made between air transportation and land transportation (road and rail). The underlying algorithm can identify flights from values such as journey speed and duration. Further details of the methodology can be found here.

Don’t miss out on a single post. Subscribe to LUCA Data Speaks.

#CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business

ElevenPaths    9 January, 2018

The new year has started with a story that has taken the covers of specialized and generalist media all around the world. The vulnerabilities named as Meltdown and Spectre have put on the table that even aspects that we took for granted as the architecture of the hardware that makes operate almost all of our systems is likely to have to be reinvented. The correction of this type of failures in the future should be put to the test with new designs that prevent them, but until these new systems go on the market it is necessary to find contingency software solutions that mitigate the problem in the meantime.

The different operating systems have tried to deal with a vulnerability that was notified to several operating systems security teams on November 9, 2017. In fact, the proofs of concept included in the Meltdown paper are made on Firefox 56, which was the current stable version until the arrival of Firefox Quantum (version 57) on November 14 of that same month. According to the managers of Canonical, the company responsible for the development and maintenance of Ubuntu, this date is important providing that this was used on November 20 as a reference to establish a consensus about January 9, 2018 as the date for the publication of the details of the vulnerability by its authors.


This period of “responsible disclosure” is common in the resolution of vulnerabilities. Its objective is to guarantee that the development teams of the affected products (in this case, practically all the systems that we use from Windows to MacOS through all types of Linux or Android-based systems) have a prudent period to study the problem and develop and test the necessary patches. It is true that this operating scheme places some people in an advantageous position taking into account that they will be informed of the existence of security flaws earlier than anyone else so that they could exploit this information in beforehand. However, this is a necessary toll to pay to ensure that the identification of security issues is, both, properly recognized first and quickly patched by the time it is published.

For this reason, transparent and diligent action by people who have access to this information is necessary and enforceable. Regardless of whether the reasons for advancing the committed date of publication are justified or not (if the fear was a possible loss of authorship, the papers could have been timestamped in any public blockchain blockchain, for example), we have to be clear about our priorities to face problems reported with enough time to be fixed in reasonable periods of time because, unfortunately, there may not be a second chance to protect our systems.

Top Stories

Spear Phishing Attacks Already Targeting Pyeongchang Olympic Games

Security researchers from McAfee reported hackers are already targeting Pyeongchang Olympic Games, many organizations associated with the event had received spear phishing messages. The campaigns have begun on December 22, attackers used spoofed messages that pretend to come from South Korea’s National Counter-Terrorism Center. The analysis revealed the email was sent from an address in Singapore and referred alleged antiterror drills in the region in preparation for the Olympic Games. Attackers attempt to trick victims into opening a document in Korean titled “Organized by Ministry of Agriculture and Forestry and Pyeongchang Winter Olympics.”

More information at McAfee

Iran Infy Group MayAattempt To Target Protesters and Their Foreign Contacts

According to cybersecurity firms and researchers, a nation-state actor called Infy is intensifying its attacks against anyone is in contact with protesters. The Infy malware was first submitted to VirusTotal on August 2007, meanwhile, the C&C domain used by the oldest sample spotted by the experts has been associated with a malicious campaign dated back December 2004. The malware evolved over the years, the authors improved it by implementing new features such as support for the Microsoft Edge web browser that was introduced in the version 30. Unlike other Iranian nation-state actors who target foreign organizations, the Infy group appears focused on opponents and dissidents.

More information at Palo Alto

Rest of the Week´s News

CoffeeMiner: Hacking WiFi Networks To Mine Cryptocurrencies

A developer named Arnau has published a proof-of-concept project dubbed CoffeeMiner for hacking public Wi-Fi networks to inject crypto-mining code into connected browsing sessions, an ingenious method to rapidly monetize illegal efforts. Arnau explained how to power a Man-In-The-Middle attack to inject some javascript in the html pages accessed by the connected users. In this way all the devices connected to a WiFi network are forced to be mine a cryptocurrency.

More information at Security Affairs

Critical Flaw Reported In phpMyAdmin Lets Attackers Damage Databases

A critical security vulnerability has been reported in phpMyAdmin, one of the most popular applications for managing the MySQL database, which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and affects phpMyAdmin versions 4.7.x (prior to 4.7.7).

More information at The Hacker News

Critical Unpatched Flaws Disclosed In Western Digital ‘My Cloud’ Storage Devices

Security researchers have discovered several severe vulnerabilities and a secret hard-coded backdoor in Western Digital’s My Cloud NAS devices that could allow remote attackers to gain unrestricted root access to the device. The device lets users not only share files in a home network, but the private cloud feature also allows them to access their data from anywhere at any time.

More information at Gulftech

Further Reading

Hundreds of GPS Location Tracking Services Leaving User Data Open to Hackers

More information at The Hacker News

PyCryptoMiner Botnet, a New Crypto-Miner Botnet Spreads Over SSH

More information at Security Affairs

Member of Lurk Gang Admits Creation of WannaCry for Intelligence Agencies

More information at Security Affairs

Dining with Data

AI of Things    8 January, 2018
Eating out at your favourite restaurant, discovering a hidden gem or even trying out a new recipe at home are some of the best ways to spend time. Some would go as far as to suggest that food ought to be included as a sixth love language. The US National Restaurant Association predicted that the restaurant industry was worth $799bn last year and it is a sector that continues to grow. In this blog, we explore five ways in which your dining experiences of the future may be shaped by data science and artificial intelligence. Starters anyone?

Reaching the right customers
One of the most important challenges for any restaurant is effective communication. Consumers are increasingly demanding and want to interact with the brands they like on their terms. Marketing campaigns can be extremely costly (both in terms of money and time) but Big Data can be the key. Technologies such as Smart Steps provide valuable insights on the movement of people based on mobile data. For example, a restaurant could send a targeted text to potential customers who pass them on their way home, with a promotional offer included. Analysis of the data available means that the risk of promotions can be minimized.
Data is the underlying force in how to be meaningful and engaging to your guests.”  Prem Kiran – Fishbowl Inc.

Location site planning

Using origin and destination information can also help businesses in the important decision of where to open a new chain of their restaurant. The aim is to find a site with a large number of potential clients whilst avoiding cannibalization of existing store. Well-known brands such as Starbucks, who seem to have a shop on every corner, are already using data to optimize location planning. If you’re interested in finding out more, have a read about the LUCA collaboration with Natura, the largest Brazilian cosmetics company.
View of a busy coffee shop
Figure 2 : Data science can be used to find the optimal location for a new restaurant or café.

Improving the dining experience

Technology is playing an increasingly important part in the reservation process too. One of the most common apps is OpenTable, who claim to seat 21 million diners each month. The company also provide services for restauranteurs, offering insights about table availability and the dining habits of customers. Reviews are a key source of data, and analysis of which words come up most frequently can show companies not only how well they are performing, but also which dishes are “trending”. Food Genius offers a similar service, analyzing millions of menu items to offer the best suggestions. Using such techniques, restaurants can improve the dining experience though reducing queue times, improving waiter service and offering a menu that appeals to the customers’ taste buds.

Ordering with your eyes

We all have that one friend who takes ages trying to decide between three options on the menu, and then ends up ordering the same thing they always do. Fortunately, restaurants of the future may be able to help them decide! Back in 2014, Pizza Hut worked in collaboration with eye tracking technology specialist Tobii to develop a menu that analyzes where your focus lingers and suggests the perfect pizza for you. You can watch a demo here. With the ongoing improvements of artificial intelligence technology, it could be expected that interactive menus like this will become even more accurate over time.
Pizza on a slate table.
Figure 3 : Would you trust your eyes to order a pizza by themselves?

Computer generated recipes

Imagine the scenario; you’re having a few friends over for dinner, but you don’t want to serve the same thing you always do and you’re stuck for ideas. What do you do? Well, in the future you might turn to an AI chef to offer a creative and delicious new recipe! A few years ago, IBM developed a program that harnessed the power of Big Data, combining chemical and mathematical principles in its algorithms. Check out this TED Talk about cognitive cooking to learn more.
These are just five examples of how data can change how we enjoy food, and at LUCA we’re exciting to see what other developments take place in the coming years. Which of these uses would you most like to see in your favourite restaurant? Don’t forget to follow us on Twitter and LinkedIn to be the first to hear about the latest news and events!

Don’t miss out on a single post. Subscribe to LUCA Data Speaks.

The 10 best blogposts of 2017

Mirian Martinez Varas    4 January, 2018

The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to  survey the best articles published during the past year. This selection includes interviews with global benchmarks in the sector, analyses of IoT ecosystem, presentations of interesting initiatives and forecasts of the trends that will emerge in 2018.

  • Programming languages in the era of the Internet of Things: What are the most common programming languages ​​ in the development of IoT? The choice of language determines the final product or service, as well as the technical possibilities and the user experience. In the era of the Internet of Things, choosing the programming language properly is vital to the success of the project. In this text, we explain the details on how to choose them properly.
  • GeoGestion, the Mobile Workers’ Internet: This solution provides fundamental assistance to all traditional companies that need help carrying out a digital transformation of processes that until now were solved by manual paperwork. GeoGestion allows the administrator to find out where their employees are, to lower their manual tasks intuitively, to help security teams improve their efficiency and to improve the work of sales teams. All this is thanks to the optimization of processes that until now were manual and costly for the company in terms of both time and resources. In this article, we explain how GeoGestion works.
  • Ronald van Loon: “The information that belongs to the IoT exists within the concept of Big Data and the vast amount of data it represents”: As an expert in Big Data, Data Management and IoT, Ronald van Loon helps hundreds of companies direct and generate value from the data they generate. His experience offering data analysis to consumers has catapulted him to become one of the biggest influencers in the world in Big Data. Therefore, we asked him about his view on the important role played by Big Data in the IoT, as well as the main challenges he faces and the future of companies in relation to the Internet of Things.
  • José Ignacio Guerra: “We are the protagonists in the IoT scene in Latin America”: The Telefónica R+D centre in Chile, also known as TRD Chile, is a benchmark for IoT technologies since it is the only research complex in Latin America that brings together all the disciplines that make up Internet of Things. José Ignacio Guerra is a Communications Architect at the centre and is leading several projects and initiatives aimed at improving the adoption, penetration and consolidation of technologies. In this interview, he tells us about his experiences.
  • Chuck Martin: “The industry can anticipate consumers’ needs even before they have these needs. This is the future that awaits us with Internet of Things”:Martin is a best-selling writer and former Vice President at IBM. His experience in the sector allowed him to predict the arrival of the network that supports IoT back in 1998. In this interview, Martin gives us his expert vision of the current situation and the future that we will see in the Internet of Things.
  • Interview with Sandra Fernández Curias: “Beyond the technological ecosystem, the IoT is an enabler of the digital transformation of business”: As one of the most prominent experts in IoT-based business at Telefónica, Sandra Fernández Curias, the company’s Strategy Manager, gives us a unique opportunity to understand the main trends in the development of the IoT and the secrets behind mass adoption by users and businesses.
  • Interview with José Rodríguez: “Security is a reason for confidence when deploying IoT solutions”: In this post, José Rodríguez, IoT security manager at Telefónica, shares his experience to help us to better understand what security challenges and solutions the experts deal with every day. This text answers the question of what we have learned so far when talking about cybersecurity in the IoT. 
  • Why physical stores should be connected and digitalized: The evolution in the retail sector irremediably connects online sales with in-store service. Today, businesses must connect to the world if they want to make the most of the opportunities offered by the Internet. If not, they are condemned to become obsolete and inefficient. In this post, we explain what role the IoT plays in this process and discuss the possibilities offered by technology.
  • Things Matter – Connecting things with people and what really matters: 800 surveys and 60 user experiences are the basis of the last report, “Things Matter”, which tries to give users a voice. In conjunction with the consultancies Accenture and Ipsos, Telefónica sheds light on the spread of IoT, the way it is used, use profiles and related topics. We summarize and analyze the conclusions in this article.
  • IoT trends in 2018, connectivity in the limelight: In 2017, we witnessed the rise of technologies associated with Big Data, the spread of VR and the emergence of autonomous cars, among other new developments. Now, the big picture seems to be coalescing around certain applications and technological solutions such as eSIM, Blockchain-based IoT, Edge solutions and many more. In this article, we reveal the trends that will determine the direction of the development of connectivity in 2018.