ElevenPaths The hugest collection of usernames and passwords has been filtered…or not (I) Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...
Paloma Recuero de los Santos Python for all (1): Installation of the Anaconda environment Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
AI of Things The acceleration of the insurance sector in Big Data Of all the applications of Big Data, insurance companies demand to exploit the value of their data to enhance their relationship with their customer, from the acquisition to loyalty. In...
Beatriz Sanz Baños Movistar Car: transform your vehicle into a connected car The application of the Internet of Things in the devices of our environment has brought about an authentic revolution in our lives. Connectivity gives us an efficient digital life, both at work and...
Paloma, Recuero de los Santos Dare with Python: An experiment for all (intro) As we did in our experiment on the Titanic dataset in Azure Machine Learning Studio, we will continue with the “Learning by doing” strategy because we believe that the...
ElevenPaths Detected an extension in Chrome Web Store, active from February, that steals credit cards We have detected an extension for Google Chrome, still active, that steals data from web site forms visited by the victims. This extension, which is still available on Chrome...
AI of Things The best Data Science certifications Over the last 10 years, the amount of data we have generated has soared to unprecedented heights. It is said that by 2020, each person will be generating 1.7...
Gonzalo Álvarez Marañón 2019 Won’t Be the Year When Quantum Computers Replace the Cryptography That We All Use What would happen if a fully error corrected quantum computer of several thousands of logical qubits started working today? Public key infrastructures would fall down. The secrets of the...
AI of Things Visual Object Detection Transforms Manufacturing Industries The automation trend is being accelerated by daily advances in Artificial Intelligence and Deep Learning. In the manufacturing industry, the automation of tasks by machines has become one of...
ElevenPaths Open source maintainer burnout as an attack surface Introduction Software development has evolved greatly in the last decades. It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our...
ElevenPaths Mum, I want to be a hacker The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Heartbleed plugin for FOCA By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...