Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Movistar Car: transform your vehicle into a connected car What is IoT: Solutions and future applications
  • Big Data
    • How AI is revolutionising the Classical Music industry: An analysis of the musical AI by Aiva Technologies LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it
  • Cybersecurity
    • Cyber Security Weekly Briefing May 29- June 4 Redefining Cloud Security with SASE

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • What Kind of Professionals Work in Our Security Operations Center (SOC)?
      ElevenPaths

      What Kind of Professionals Work in Our Security Operations Center (SOC)?

      Discover the different profiles of the SOC professionals in this post, who work day and night to provide the best security to our customers.
      ElevenPaths

      #CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States

      After just over two years of Congress passed a major bill that encouraged businesses to share with the government how and when threat actors were trying to get into...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Innovation and Laboratory Area in ElevenPaths

      Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%

      Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
      The First Official Vulnerabilities in Machine Learning in General
      Franco Piergallini Guida

      The First Official Vulnerabilities in Machine Learning in General

      Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • 20 Questions about Covid-19 Tracing Apps
      Gonzalo Álvarez Marañón

      20 Questions about Covid-19 Tracing Apps

      Covid-19 tracking apps may raise many questions about citizens' privacy and security. We solve some of them in this article.
      Telefónica Tech

      Cyber Security Weekly Briefing, 15 – 19 May

      Vulnerabilities in cloud platforms Otorio’s team of researchers found 11 vulnerabilities affecting different cloud management platform providers. Sierra Wireless, Teltonika Networks and InHand Networks are the affected companies. The security flaws...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Using DIARIO Through FOCA For Malware Analysis
Carlos Ávila

Using DIARIO Through FOCA For Malware Analysis

Web servers are one of the main channels for the spread of malware on the internet. They are frequently attacked in search of security flaws that allow them to...
malware
Gabriel Bergel

Mobile Malware, part of the Generation Z

Generation Z or “post Millenials” is the demographic group born between 1994 and 2010, mobile malware was born in 2004 with Cabir, the first virus to affect Symbian Series 60 phones....
ElevenPaths

Cyber Security Weekly Briefing May 8-14

Ransomware attack on a main US oil pipeline US energy company Colonial Pipeline was hit by a ransomware attack on Friday, causing the shutdown of around 8800km of pipelines supplying...
4 Tips for A Safe Return to the Workplace
ElevenPaths

4 Tips for a Safe Return to the Workplace

It has now been a year since many of us left our physical office behind to embrace remote working. Living rooms and bedrooms became our new offices and meeting rooms,...
Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography
Gonzalo Álvarez Marañón

Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography

Do you know what’ s the difference between quantum computing, quantum cryptography and post-quantum cryptography? Because to be honest, they have (almost) nothing to do with each other. They...
Tips to Download Apps Securely
ElevenPaths

Tips to Download Apps Securely

The arrival of smartphones brought about a paradigm shift in the way we use and consume content through mobile devices. So much so that, from that moment on, they...
Cyber Security Weekly Briefing May 1-7
ElevenPaths

Cyber Security Weekly Briefing May 1-7

Apple fixes four 0-day vulnerabilities in WebKit Apple released yesterday a security update to fix four 0-day vulnerabilities that could be actively exploited, according to Apple itself. These four flaws...
Cyber Security Weekly Briefing April 24-30 2021
ElevenPaths

Cyber Security Weekly Briefing April 24-30

BadAlloc – Critical Vulnerabilities in Industrial IoT and OT Devices Microsoft security researchers have discovered 25 critical remote code execution (RCE) vulnerabilities, collectively referred to as BadAlloc, affecting a wide...
Do I Really Need an Antivirus?
ElevenPaths

Do I Really Need an Antivirus?

How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.
NFT Fever: The Latest Cryptocurrency Killing It Online
Gonzalo Álvarez Marañón

NFT Fever: The Latest Cryptocurrency Killing It Online

In May 2007, the digital artist known as Beeple decided to create and publish a new piece of artwork on the Internet every day. True to his word, he...

Navegación de entradas

Previous articles
1 … 16 17 18 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration