Florence Broderick ElevenPaths is now a NoMoreRansom.org associated partner Ransomware has a severe impact for IT companies and users. The increasing popularity of this security threat along with the profitable business for criminals make ransomware one of the...
Ana Zamora Hackathons are not just for developers By Glyn Povah, Head of Global Product Development at LUCA. Hackathon is derived from the English words “hack” and “marathon”, and if you Google the word “hackathon” you’ll get something...
ElevenPaths ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
AI of Things 4 times Big Data invaded the world of Fashion The relationship between Big Data and Fashion stems back to 2013 when giants like ASOS and Gap started to use data to enhance their customer shopping experience – revolutionizing the way consumers buy garments online. 1. Chanel’s Data...
AI of Things The 6 data-driven pioneers of politics Data is starting to change the way we run our world, and businesses have tended to lead the adoption and application of Big Data technology. Nevertheless, there are some...
Florence Broderick ElevenPaths and iLife Security signed an agreement for implementing services in support, IT management and security Aiming to help clients to adapt their systems in this new technological reality and its growing challenges in security matters, ElevenPaths and iLife Security, company specialized in Full Outsorcing...
AI of Things MWC Day 4: Understanding road safety with Open and Mobile Data It’s day 4 of Mobile World Congress here in Barcelona and the experience is coming to an end. As we mentioned yesterday, we’re sharing a video each day on our blog...
Florence Broderick ElevenPaths and Opencloud Factory signed an agreement to provide a unique solution for access control in corporative networks ElevenPaths and Opencloud Factory signed a technological agreement, aiming to develop a unique solution for controlling the access in corporative networks. Thanks to this agreement, Mobile Connect...
AI of Things MWC Day 2: Our data-driven approach to Commuting and Pollution It’s the second day of Mobile World Congress here in Barcelona and one of the demos we’re focusing on today looks at the intriguing relationship between commuting and pollution. In this data...
Florence Broderick MWC Day 2: Our partnership with UNICEF to boost Big Data for Social Good Today we are proud to announce our latest collaboration with UNICEF through their Magic Box initiative – a Big Data for Social Good platform which collects real-time data,...
Innovation Marketing Team Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...