Florence Broderick [New report] “Cyber-insurance: cyber risk transfer in Spain” Donwload the full report here Yesterday we presented to the media and industry analysts the first report on the cyber risks transfer through cyber policies in Spain, prepared in conjunction...
Florence Broderick Mobile Threat Protection The agreement between Eleven Paths and Check Point on commercialization and technological integration allows Telefonica to complement its Enterprise Mobility Management (EMM) solution with the most advanced mobile protection...
Florence Broderick ElevenPaths and Check Point Software Technologies provide joint Mobile Protection Services Globally Joint offering protects iOS® and Android® smartphones and tablets used in businesses of any size from the cyberthreats that proliferate the worldwide mobile ecosystem. Madrid, April 22, 2016.– ElevenPaths, a...
Florence Broderick ElevenPaths y Check Point Software Technologies ofrecemos servicios conjuntos de seguridad móvil La oferta protegerá smartphones y tabletas iOS® y Android® utilizados en negocios de cualquier tamaño de las ciberamenazas que proliferan en el ecosistema móvil mundial. Madrid, 22 de abril de...
Florence Broderick Social engineering is more active than ever The fact that Social Engineering has been the easiest method used by the scammers is not new. What we are going to describe in this blog today has been...
Cascajo Sastre María eSIM cards are here to boost the IoT SIM cards are much more than what they appear to be. Within an apparently simple rectangular metal chip encased in a plastic carrier is a miniature computer! SIM stands...
Florence Broderick Mobile phone Surveillance: Who’s listening to your calls? In the current digital world, espionage is much more common than we think. Revelations from Edward Snowden that the NSA hacked SIMs to spy on mobile conversations prove that...
Florence Broderick Sinfonier Community and beyond! When we show Sinfonier and I mention its benefits, people always do the simple same question: So, we can do anything with it? The simple answer is yes, if...
Florence Broderick [New report] Demographic Analysis of Google Play Donwload the full report here Download the new report shows that Tacyt had dissected a total of 3,365,527 applications from the Google Play Store, of which only 2,438,864 remained...
María Cascajo Sastre The Internet of Learning Imagine a future where students have access to the best educational resources in the world from their classrooms or even from their homes, instructed by the best educators no...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...