ElevenPaths The hugest collection of usernames and passwords has been filtered…or not (I) Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...
Paloma Recuero de los Santos Python for all (1): Installation of the Anaconda environment Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
AI of Things The acceleration of the insurance sector in Big Data Of all the applications of Big Data, insurance companies demand to exploit the value of their data to enhance their relationship with their customer, from the acquisition to loyalty. In...
Beatriz Sanz Baños Movistar Car: transform your vehicle into a connected car The application of the Internet of Things in the devices of our environment has brought about an authentic revolution in our lives. Connectivity gives us an efficient digital life, both at work and...
Paloma, Recuero de los Santos Dare with Python: An experiment for all (intro) As we did in our experiment on the Titanic dataset in Azure Machine Learning Studio, we will continue with the “Learning by doing” strategy because we believe that the...
ElevenPaths Detected an extension in Chrome Web Store, active from February, that steals credit cards We have detected an extension for Google Chrome, still active, that steals data from web site forms visited by the victims. This extension, which is still available on Chrome...
AI of Things The best Data Science certifications Over the last 10 years, the amount of data we have generated has soared to unprecedented heights. It is said that by 2020, each person will be generating 1.7...
Gonzalo Álvarez Marañón 2019 Won’t Be the Year When Quantum Computers Replace the Cryptography That We All Use What would happen if a fully error corrected quantum computer of several thousands of logical qubits started working today? Public key infrastructures would fall down. The secrets of the...
AI of Things Visual Object Detection Transforms Manufacturing Industries The automation trend is being accelerated by daily advances in Artificial Intelligence and Deep Learning. In the manufacturing industry, the automation of tasks by machines has become one of...
ElevenPaths Open source maintainer burnout as an attack surface Introduction Software development has evolved greatly in the last decades. It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...