Richard Benjamins How these 4 sports are using Data Science Thousands of companies around the world may have started their journey to become data-driven, harnessing the full potential of Big Data, however, the world of professional sports is only...
Florence Broderick Latch Plugins Contest 2016: we finally have winners! We can now announce the winners of our “Latch Plugins Contest 2016“, showing the creativity, ideas and imagination of the participants in the submitted proposals. This edition of the...
Florence Broderick Jam Session with Greg Day Madrid 2017 Roundup Estrenamos el mes de febrero uniéndonos a nuestros colegas de Palo Alto para celebrar nuestra primera Jam Session del año en Madrid. Este año iniciamos nuestras sesiones de visión...
AI of Things WiDS Madrid 2017 Roundup On Friday, we joined our colleagues from Synergic Partners to celebrate Stanford University’s Women in Data Science (WiDS) event for the first time ever in Madrid. This international event,...
Ana Zamora LUCA Talk 1: Using Big Data to understand mobility and pollution Last Monday we hosted our very first LUCA webinar with great success, with more than 140 people connecting to our live stream. Technology, and more specifically Big Data, is enabling...
Ana Zamora Chema Alonso stars in “Big Data, Living with Algorithms” Yesterday evening, RTVE launched the first in a series of documentaries entitled “Documentos TV”, showing just how digital our daily lives have become and how the control of these...
Florence Broderick New Report: Most common errors when implementing HPKP, HSTS and preload conditions We have collected and visited two different sources of domains and webpages, Alexa top million domains, and Shodan. These results come from November 2016 searches. From those domains, we...
Florence Broderick See You at the RSA Conference 2017 The U.S. city of San Francisco is to host once again, as it does every year, one of the most important events worldwide in the field of security, RSA...
Florence Broderick Browser Extension Usage by the Islamic State Propaganda One of the tools that the Islamic State has been using to spread its propaganda is the use of social networks. In the past they have shown how capable...
AI of Things Our Christmas Lip Sync It’s been a busy few months since our LUCA launch in October, but finally the time has come to have a few days rest and enjoy the festive spirit....
Innovation Marketing Team Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...