Salmerón Uribes Marina The importance of labeling: spotlabel In an increasingly digitized world, technological innovation is a fundamental value. The adoption of new technologies and the possibilities of connectivity offered by Internet of Things can give a...
ElevenPaths Detected an extension in Chrome Web Store, active from February, that steals credit cards We have detected an extension for Google Chrome, still active, that steals data from web site forms visited by the victims. This extension, which is still available on Chrome...
AI of Things The best Data Science certifications Over the last 10 years, the amount of data we have generated has soared to unprecedented heights. It is said that by 2020, each person will be generating 1.7...
Gonzalo Álvarez Marañón 2019 Won’t Be the Year When Quantum Computers Replace the Cryptography That We All Use What would happen if a fully error corrected quantum computer of several thousands of logical qubits started working today? Public key infrastructures would fall down. The secrets of the...
AI of Things Visual Object Detection Transforms Manufacturing Industries The automation trend is being accelerated by daily advances in Artificial Intelligence and Deep Learning. In the manufacturing industry, the automation of tasks by machines has become one of...
Cascajo Sastre María Sweet dreams with IoT The development of Internet of Things has changed our society and multiple sectors like Industry, Retail, construction or mobility in cities among others. This technology makes life easier for people in many areas; one of them is comfort and...
Beatriz Sanz Baños Your assets controlled with a click: Things Ready Link In an increasingly digital world, technology innovation is an essential value. The adoption of new technologies and connectivity possibilities of Internet of Things (IoT) provides a great competitive advantage...
ElevenPaths Open source maintainer burnout as an attack surface Introduction Software development has evolved greatly in the last decades. It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our...
ElevenPaths New report: Twitter botnets detection in sports event We all know that a botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform DDoS attacks,...
Beatriz Sanz Baños Worker’s Diary IoT III 18:00. Daniel arrives at school to pick up his children. He knows that they are still inside thanks to the trackers in their backpacks . While he is waiting for them, he can check the daily news on his smartwatch. When the children get in...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick HookMe, a tool for intercepting communications with API hooking HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...