Nacho Palou Key ingredients for today’s Smart Cities The term Smart City used to refer to “cities of the future”, but Smart Cities are increasingly turning the present. Thanks to the use of digital solutions such as...
Olivia Brookhouse How to build a Smart City: with IoT and Big Data A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Patrick Buckley Waste Management in a Smart City – The Smart Bin In today’s post, I will share with you how Waste Management is set to be revolutionised by Big Data and IoT (Internet of Things) technology. The Social Importance of Waste Management Waste management is increasingly becoming a...
Beatriz Sanz Baños Telefónica IoT and Honda reduce motorbikes robbery Pucallpa, located in the middle of the Peruvian jungle, has a big concern with the safety of their citizens and their vehicles. With a population of 200.000 inhabitants, the motorcycle...
Cascajo Sastre María Madrid is IoT Madrid has positioned itself as one of the Smart cities of reference thanks to the use of connected devices to manage the fight against pollution, lighting, traffic, parking of...
Beatriz Sanz Baños How to know how smart a Smart City is Forbes illustrates the clear cut contrast bigger cities face. On one hand, cities are responsible for generating 80% of the world’s wealth but compared to other geographical spaces they...
María Cascajo Sastre Smart Parking, IoT valet parking for Smart Cities Parking is one of the most repetitive and time consuming activities we carry out in life. We spend on average up to 106 days in our life, finding parking...
María Cascajo Sastre 10 features that the city of the (near) future will have The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
ElevenPaths Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours It is hard to say something new about Wannacry, (the ransomware itself, not the attack). But it is worth investigating how the attacker worked during last hours before the...
Florence Broderick Another month, another new rooting malware family for Android Several months ago there was a media explosion about Android-rooting malware on Google Play. Those families were discovered by Cheetah Mobile Security Research Lab, Check Point, Lookout, FireEye,...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...