AI of Things Big Data and the Blockchain phenomenon: Part II Welcome back to the second half of this mini-series about the technological phenomena that is blockchain. In my previous post, we looked at how the technology works and some...
ElevenPaths Evrial, malware that steals Bitcoins using the clipboard… and the scammed scammers Evrial is the latest cryptocoin malware stealer, and uses the power to control the clipboard as its strongest bet to get “easy money”. Elevenpaths has took a deep technical...
AI of Things One day Artificial Intelligence could save your life Intensive Care Units… a place where decisions have to be instant and accurate. Any error can result in a loss of life. That’s why Clew Medical have been conducting...
ElevenPaths #CyberSecurityPulse: Dude, Where Are My Bitcoins? Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
AI of Things Elena Gil, CEO of LUCA speaks to us about the potential of Big Data in business “We are just beginning to see the opportunities that Big Data represents” The importance of data when making any decision is growing. Elena Gil, CEO at LUCA, Telefonica’s data unit,...
Beatriz Sanz Baños “Truly the Matrix, minus the human batteries” The Fourth Industrial Revolution is about much more than just applying today’s technology to industries. It’s about integrating intelligent cyber-physical systems such as AI and machine learning along with...
ElevenPaths SandaS GRC, the best way to perform the GSMA IoT Security Assessment SandaS GRC ElevenPaths SandaS GRC allows organizations to support their business strategy, improve operational performance, mitigate operational risks and ensure regulatory compliance. Is the perfect complement with which you can...
AI of Things Could brainwave analysis turn eSport gamers into elite athletes? Content originally written by Thomas Macaulay for TechWorld. eSports has turned gamers into digital athletes with million dollar paycheques and backing from multinationals such as Telefónica, whose technologists are optimising player...
AI of Things Predictive Analysis and Machine Learning improving quality of life for refugees The refugee crisis is an ongoing issue that is sadly growing by the day. Currently, it is believed that roughly 65 million people live as refugees or are displaced...
AI of Things Come and play sports with Telefonica, and take on the best! For another year, the city of Barcelona will welcome the largest global event in the mobile industry: the Mobile World Congress. To make the most of this moment, Barcelona’s...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...