Olivia Brookhouse What is IoT: Solutions and future applications Are you interested in finding out what is the Internet of Things (IoT)? It is an ever-growing technology which opens doors to new opportunities in multiple sectors ranging from...
Beatriz Sanz Baños The trip experience starts at the airport Madrid, December 6, 2019, 11:00 a.m. César starts his vacation today. He is very excited because it will be the first time he travels to Asia. He begins an exciting...
Beatriz Sanz Baños Efficient and responsible milk production We have a new example of how technology can help us form a better society in which the production and consumption of milk is carried out in a sustainable...
Beatriz Sanz Baños IoT for a better world The Sustainable Development Goals (SDGs) are a United Nations-led initiative to address the most important problems our society faces. It encompasses “a set of interconnected social, economic and environmental...
Luis Simón Gómez Semeleder Drones in Precision Farming Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños Click & Go, the multipurpose button What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños Connected Health, or IoT as your best lifeline IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...