Did you know Gmail is being used as C&C to exfiltrate corporate data? Gmail and other email providers’ domains may be being used to take control of systems of an organization. Download the research and get informed about the details!
Have doubts whether your have been hacked? Following a few steps you can make sure you aren’t among cyber-attacks victims and that your personal data remains confidential.
“Conventional terrorism, as it has been known up to now, doesn’t exist already”, states Adolfo Hernandez – hacker, co-founder of the “think thank Thiber” and cybersecurity advisor at ElevenPaths.
The trick of stealing accounts when playing with Siri is over. Apple terminated a leak that allowed to take advantage of those iPhones which had Siri enabled on the locked screen. Chema Alonso tells us about it on his blog.
In this article lainformacion.com gathers concerns about cybersecurity and opinions of the hacker and the head of Big Data Department of Telefónica at IMPACT Talk Conference, organized by the European University of Madrid.
Social media marketing has been adopted by the companies for the it benefits, however it also makes them face the threats of security bugs. How can one avoid them?
On June 21st, a Twitter user @0x2Taylor posted a message which outlined the data disclosure of 41 million account credentials belonging to Twitter. Our analyst team informs you about this new case of the latest data leakage. Download the report!
Don’t miss out on the interview about the issues related to the user safety, that BillionBytes gave to Chema Alonso – one of the most famous Spanish hacker.
The interview that BitActual gave to Chema Alonso is one of the most read articles. Learn all you need to know about computer security here.
The BozkurtHackers cyber identity is responsible for leaking the data, originated from banks based in United Arab Emirates, Bangladesh and Nepal, both through the deep web forums and Twitter. Our team of intelligence analysts unravels its true identity!
Did you know that browsing through Tor is not enough to guarantee anonymity? At ElevenPaths we found out that some gateways linked to the contents of the TOR network may disclose your identity.
Our analyst team has a new case for you! This time it is about the analysis of the Turkish City Bank data leakage. Download the report!
Telefónica is the first telephone operator to offer this service at a national level. Thanks to Mobile Connect, companies will be able to provide more security on the Internet.
The cyber identity peace_of_mind (also Peace and email@example.com) is responsible for selling the databases belonging to LinkedIn, Myspace, Tumblr, and VK among others. It also belongs to a group, related to the exploit kits sale in the Tor network.
“The banks will reject granting loans on the basis of the information obtained from Facebook. Don’t miss out on this interview!
Agreement extends 15 year relationship with Telefónica to deliver seamless and adaptive security from IoT to Cloud Networks.
My team and I are working on creating innovative technologies to build the security service portfolio which Telefónica offers to its customers worldwide.
Chema Alonso unraveled the key points of future trends in the cybersecurity field as well as some details about his persona. Don’t lose out this interview!
Con motivo del evento OpenExpo 2016, Autentia realizó una pequeña entrevista a Chema Alonso en la que nos habla de las principales vulnerabilidades de Wordpress y como fortificar las identidades de su usuarios. ¡Dale al play!
Chema Alonso “a hacker is something ideal, that many dream to be, although usually people give it a pejorative connotation”.
Our analyst team updates you on the biggest data breaches trends. Today we present you the report corresponding to the first quarter of 2016. Download it!
In the third Security Day together we announce with our experts and partners the new strategic alliances and technology integrations. During last three years this event has become a reference in cybersecurity and ICT sector at the national level.
Chema Alonso: “It is truly dangerous to leave your children alone on the Internet with the computer in their room, without knowing what they do and with whom”
Chema Alonso believes that human beings are prone to falling into addictions of any kind and taking them to extremes. This and much more in Chema Alonso’s latest interview.
The so-called premium version comes across a suspicious message offering some tasty functions. Javier Espinosa, ElevenPaths’ software engineer tells you how to take on this new fraud.
Today we celebrate Security Day under the motto Security Evolution. Every year ElevenPaths presents with its experts and partners new technological integrations. In three last years it has become a reference in the sector of cybersecurity and ICT at the
New information belonging to the Invest Bank of the United Arab Emirates was disclosed to the public through Twitter on May 6, 2016. Learn about it from our analysts!
Don’t miss the PlayGround interview with Chema Alonso, “the most famous hacker in Spain”. He will tell us about online kidnapping, Snapchat and why espionage in the web affects us all.
El “hacker” Chema Alonso sugiere en la UCLM auditorías de seguridad permanentes para prevenir ataques informáticos
Prácticamente todas las empresas y organizaciones del mundo tienen puntos vulnerables en sus sistemas informáticos y deberían mantener auditorías de seguridad constantes para evitar ciberataques. Así lo ha afirmado Chema Alonso de ElevenPaths en la Universidad de Castilla-La Mancha
On 3 April, 2016 a database, associated with the Central Population Management System, that depends on the Turkish Ministry of Interior (MERNIS in Turkish) and that contained 49,611,709 records related to Turkish citizens, was leaked. Find out more from our
On 3 May, 2016 the database leak of a company-outsourcer of technological profiles in Philippines, became public. Learn more from our analysts!
Plugin that allows to control Calls in Asterisk Servers with Latch. ¡Learn more on our YouTube channel!
This vídeo shows how to protect Nuxeo Platform accounts with Latch.
Plugin that lets you remotely control a daemon running on a Raspberry Pi or a Debian based system that turns on and off the computers on your network.
ElevenPaths, along with THIBER and some of the most important companies in technology, insurance and consulting sectors, took part in the production of the first study document on cyber risks transfer through the cyber policies in Spain.
We have the winners and their prizes that will be awarded at our second edition talent contest! Congratulations to all of you for the hard work you put in!
ElevenPaths adds Check Point to its mobile security offer which protects companies’ iOS and Android devices.
The company specialized in safety solutions for Telefónica Group has reached an agreement with Check Point Software Technologies to add Check Point mobile security technologies to its solutions and put them at the disposal of Telefónica clients worldwide.
Joint offering protects iOS® and Android® smartphones and tablets used in businesses of any size from the cyberthreats that proliferate the worldwide mobile ecosystem.
Build trust with your users and offer them the best experience when they access and interact with your digital services.
The operator offers consumers and businesses this new security standard, driven by the GSMA. It allows you to be identified through websites via your mobile number only.
More than 40,000 users of the Clean Email service of Telefonica will be able to protect access to their platform with Latch, a lock that protects digital services and online accounts. Here is the video to prove it.
¡Ya tenemos a los ganadores de la 2ª edición de nuestro concurso de talento! ¡Enhorabuena a los ganadores! Consulta todos los detalles en nuestro blog.
Here is the video demo on how biometrics and Latch work in the world of IoT (Internet of Things).
Chema Alonso from ElevenPaths, is the most recognized ethical hacker in Latin America. Last week he visited Ecuador to share a few tips on digital security with noticiero.com. Here they are.
Chema Alonso states that, “it is crucial that companies constantly apply analysis cycles and revisable security audits to all devices that are a part of new IoT ecosystems.”. Take note of this point.
Aquí tienes el vídeo resumen con la charla “La magia de las tecnologías: uso, mal uso y restricciones” de Chema Alonso en Infarma 2016.