AI of Things Which country will lead the race for AI dominace? Every January, the World Economic Forum meets in the Swiss mountain resort of Davos, bringing together politicians, economists, business leaders and more to discuss the key issues of the...
AI of Things A closer look at the GRAMMY Awards 2018 Now that January is here, it is time to look forward to one of the year’s standout events, the GRAMMYs 2018. This year, the prestigious event will be held...
Pablo Alarcón Padellano Managed Detection & Response: Prevention is Not Enough, You Need to Become Cyber-Resilient You want your organization to be cyber-resilient but you have no means? You have advanced security solutions in place, but you lack skilled staff trained to take advantage of them? You...
AI of Things 5 jobs that you didn’t know used Data Science Content originally written by Ane Urain Gurruchaga, LUCA Brand Awareness. From taking the metro, to choosing a film that best fits your tastes, the presence of data is undeniable in...
ElevenPaths #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address? As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
AI of Things Enhancing customer experiences with Smart Digits. On November 21st 2017, we hosted a webinar about accelerating the digital transformation with LUCA’s Smart Digits product portfolio. Smart Digits is a B2B platform and set of secure...
AI of Things How Germany moves Our colleagues in Telefonica NEXT have created, using mobility data, data analysis and big data, an interactive map that lets you visualize nationwide traffic flows. Cities, transport companies and...
ElevenPaths #CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business The new year has started with a story that has taken the covers of specialized and generalist media all around the world. The vulnerabilities named as Meltdown and Spectre...
AI of Things Dining with Data Eating out at your favourite restaurant, discovering a hidden gem or even trying out a new recipe at home are some of the best ways to spend time. Some...
AI of Things 7 Big Data and AI predictions for 2018 2017 was, for the most part, an extremely successful year in terms of technological advancement. The IoT era kick started, Artificial Intelligence and Machine Learning gained public interest and...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Android malware not only posing as Word documents… but Excel as well China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...