Iniesta Olyseum app launches with exclusive and intimate content

You will have its own community in the new social network, driven alongside Puyol and De la Peña and aims to bring major international cracks his fans.

Andres Iniesta drives the new app Olyseum with Carles Puyol and Ivan de la PeñaAndres Iniesta drives the new app Olyseum with Carles Puyol and Ivan de la Peña.  Andres Iniesta has launched Wednesday Olyseum , a social network that crack Fuentealbilla drives with Carles Puyol and Iván de la Peña and aims to bring the highest international level athletes to their fans.

The platform allows fans to learn about their idols, access to unpublished content and interact like never before.

Andrés has its own community within Olyseum , the so - called ' Iniesta Community ', in which the player Barca and Red publish exclusive content , held raffles and offer surprises during the month of September: "Users can meet exclusively the everyday player a much more intimate "mode, explained in the statement issued by the company.

Olyseum is a project founded and led by engineer Carlos Grenoir, with the participation of Kevin Mitnick , considered the hacker world 's most famous; entrepreneurs Jan Aramburu and Enric Flix and said Iniesta, Puyol and De la Peña .

The app , available in English and Castilian, is available for operating systems iOS and Android . The contents are divided into three areas:

  1. Generated exclusively by Olyseum and ambassadors
  2. Those generated by the users that you follow
  3. And concentrator news that brings together in one place dozens of sports sources in real time

Source: MUNDO DEPORTIVO

Topics: Social Engineering, Speaking Engagements, Android, English and Castillian, fans interact, penetration testing, Enric Flix, Carlos Grenoir, cyber security, security awareness training, security consultant, Jan Aramburu, malware, simulated phishing, Spam, Carles Puyol and Ivan de la Peña, cybercrime, new social network, Olyseum, iOS, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg