ElevenPaths CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
Beatriz Sanz Baños The future of Internet of Things Looking at just how much the internet has changed our lives, it’s incredible to imagine how some people didn’t took it seriously at the beginning. One of the reasons...
AI of Things Traffic spikes before football games? The effect of the World Cup in Germany Post written by Telefónica NEXT Once every four years, The FIFA World Cup brings fans together in a month of surprising events. Every game is different, but each is filled...
Beatriz Sanz Baños Say goodbye to traffic jams The hours that we lose in traffic jams in big cities would be better used in what really matters to us thanks to the Internet of Things. We are talking...
AI of Things How Germany Moves project wins at the German Online Communications Awards In another post from the start of this year, which you can read here, we presented the interactivty mobility map that our colleagues at Telefónica NEXT in Germany had created....
ElevenPaths #CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States After just over two years of Congress passed a major bill that encouraged businesses to share with the government how and when threat actors were trying to get into...
AI of Things A history of Lisp and its use in neural networks – Part I Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Today we kick off a new series that will consist in two articles in which we will briefly introduce you to...
AI of Things Do not miss what happened at NID 2018: WE ARE IN Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
AI of Things Deep Learning vs Atari: train your AI to dominate classic videogames (Part III) Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it <If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...