Olivia Brookhouse What is IoT: Solutions and future applications Are you interested in finding out what is the Internet of Things (IoT)? It is an ever-growing technology which opens doors to new opportunities in multiple sectors ranging from...
Beatriz Sanz Baños Discover the Connected Pool Did you know that in Spain there are around 1,200,000 swimming pools dedicated to leisure and sport? That means 1 pool for every 39 people! Spain is the country...
Beatriz Sanz Baños IoT arrives inside the volcanoes Thanks to the installation of sensors inside the crater, the information collected in real time about temperature, humidity and atmospheric pressure, can be accessed. In this way, you have...
Beatriz Sanz Baños Smart gas stations and how to find them In the last few years, gas stations started to offer travelers a wide range of possibilities beyond mere refueling. This increases competition between service stations, which is forcing these...
AI of Things We apply quantum technology to real use cases of Blockchain and IoT Putting together Quantum Technology, Blockchain and the Internet of Things in one title seems like a formula for generating clicks. However, this is what we have done at Telefónica:...
Beatriz Sanz Baños IoT to improve your Tourist Experience Would you like to enjoy a more personalized and efficient experience during your vacation? The arrival of IoT is already a real revolution in the tourism sector where this...
Beatriz Sanz Baños What is Smart Retail? The implementation of IoT technology in the Retail sector allows offering personalized shopping experiences through smart stores. Thanks to information collected, processes can be optimized and more effective strategies can...
Beatriz Sanz Baños Say goodbye to traffic jams The hours that we lose in traffic jams in big cities would be better used in what really matters to us thanks to the Internet of Things. We are talking...
Beatriz Sanz Baños A world-champion IoT Are you ready for the soccer World Cup? If not, you should probably start getting ready: this event, which along with the Olympics is considered the most important sporting...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...