Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • “The client seeks to live a different experience with each purchase” Safer and controlled waters with smart buoys
  • Big Data
    • Blockchain technology A new organizational role for Artificial Intelligence: the Responsible AI Champion
  • Cybersecurity
    • #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties Cybersecurity Weekly Briefing October 24-30
Think Big / Business
  • Big Data & AI
    • Diego Martín Moreno

      Blockchain technology

      In the previous article we talked about the basic concepts of the blockchain, and now we will focus on the current technologies to implement a blockchain solution. Blockchain and Smart...
      Richard Benjamins

      A new organizational role for Artificial Intelligence: the Responsible AI Champion

      With the increasing uptake of Artificial Intelligence (AI), more attention is given to its potential unintended negative consequences. This has led to a proliferation of voluntary ethical guidelines or...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Salmerón Uribes Marina

      “The client seeks to live a different experience with each purchase”

      “The music of nougat “El Almendro” is recognized by one hundred percent of the respondents” We all take it for granted when entering a hotel, a cafeteria or a supermarket...
      Beatriz Sanz Baños

      Safer and controlled waters with smart buoys

      Internet of Things is not limited to dry land. We already saw how they it inserted itself in the sea to improve the experience of bathers and ensure more...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

      Social networks image The Internet giants are going to great lengths to be transparent with their communication about the information they are gathering from their users. In the case...
      Cybersecurity Weekly Briefing October 24-30
      ElevenPaths

      Cybersecurity Weekly Briefing October 24-30

      Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ Management Console (SSMC) storage management software. HPE...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Vulnerabilities

How to Trick Apps That Use Deep Learning for Melanoma Detection
Franco Piergallini Guida

How to Trick Apps That Use Deep Learning for Melanoma Detection

One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
Cyber Security Weekly Briefing February 13-19
ElevenPaths

Cyber Security Weekly Briefing February 13-19

​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Cyber Security Weekly Briefing February 6-12
ElevenPaths

Cyber Security Weekly Briefing February 6-12

Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and altered the...
CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)
Javier Provecho

CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)

On December 2nd, ElevenPaths’ CTO SRE team discovered an unauthenticated API within Harbor, a cloud native registry part of the CNCF. It is commonly used as an agnostic Docker...
Digital Zombies and Social Engineering
Gabriel Bergel

Digital Zombies and Social Engineering

This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you credit it, and I loved it. We...
Cyber Security Weekly Briefing 30 January - 5 February
ElevenPaths

Cyber Security Weekly Briefing 30 January – 5 February

Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is widely deployed...
Snitch Cryptography: How to Crack Tamper-Proof Devices
Gonzalo Álvarez Marañón

Snitch Cryptography: How to Crack Tamper-Proof Devices

Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation's Intranet
Amador Aparicio

CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation’s Intranet

Parallels RAS (Remote Application Server) is a virtual desktop infrastructure (VDI) and application delivery solution that enables an organisation’s employees and clients to access and use applications, desktops and...
Detecting the Indicators of An Attack
Diego Samuel Espitia

Detecting the Indicators of An Attack

We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
Cyber Security Weekly Briefing January 23-29
ElevenPaths

Cyber Security Weekly Briefing January 23-29

Attack against SonicWall by exploiting a possible 0-day in its VPN appliances Firewall manufacturer SonicWall has issued a security alert warning that it has detected a sophisticated attack against...

Navegación de entradas

Volver a portada
1 2 … 11
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Detecting the Indicators of An Attack
Diego Samuel Espitia
Detecting the Indicators of An Attack
We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
4 Tips to Secure Your Data
ElevenPaths
4 Tips to Secure Your Data
We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
Innovation and Laboratory Area in ElevenPaths
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
There are many reports on security trends and summaries, but at ElevenPaths we want to make a difference. From the Innovation and Laboratory team, we have just launched our...
Laboratory Information Management System (LIMS) and Its Mobile Applications
Carlos Ávila
Laboratory Information Management System (LIMS) and its Mobile Applications
For scientists and researchers, optimising time in a laboratory nowadays plays a key role in processing and delivering results. There are applications that have specialised capabilities for R&D laboratories,...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility