Florence Broderick New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
AI of Things Big Data for Social Good: How 6 billion mobile phones are social sensors to save lives Attending One Young World as a returning ambassadorthis year as one of the 40-strong delegation was an absolute privilege. Taking part alongside young employees from hundreds of public and...
Richard Benjamins Telco Data Analytics: what’s next in Big Data for Telcos By Lora Mihova, Strategy Manager at LUCA and Richard Benjamins, Director External Positioning and Big Data for Social Good at LUCA. The European version of Telco Data Analytics Conference took place on...
Florence Broderick ElevenPaths and Symantec plan a joint offer Security Solutions for IoT environments ElevenPaths collaborates with Symantec as technology provider for its Security certificate service for IoT. Madrid, October 31 2016.- ElevenPaths, Telefónica Cyber Security Unit, announce our intends to collaborate with Symantec,...
Florence Broderick Now you can use Latch with Dropbox, Facebook and others digital services Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick Cryptographic Security in IoT (II) The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
AI of Things Can Big Data reshape the Outdoor Media sector? Out-of-home (OOH) adspend in the UK rose to £1 billion 2014, and is predicted to grow by 4.8% in 2016 according to a recent report. To ensure they benefit...
Florence Broderick ElevenPaths acquires Shadow technology from Gradiant Chema Alonso (Chief Data Officer of Telefónica and Chairman of ElevenPaths) announced during Security Innovation Day 2016, the purchase of the Gradiant’s solution for document security, SHADOW. ...
Richard Benjamins The 6 challenges of Big Data for Social Good Many of us are familiar with the Sustainable Development Goals set by the United Nations for 2030 and increasingly more and more companies and organizations are contributing to their achievement. However, there...
Richard Benjamins Big Data Week 2016: Forget Big Data, Artificial Intelligence is the new kid on the block Yesterday, the LUCA team attended the first day of Big Data Week. BDW is a global community that organizes an annual event focusing on the social, political, and technological...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick New tool: Maltego transforms for Tacyt If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...