Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Activation Programme: Innovate with IoT Shaping IoT: 2G refarming. What does it mean?
  • Big Data
    • MWC Day 4: Understanding road safety with Open and Mobile Data The best-bits of Changing the Game with Big Data Valencia!
  • Cybersecurity
    • Monero says goodbye to the ASIC miners (at least for now) Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Accelerating European cyber security between the United Kingdom and Telefonica (Wayra) – Part one of two

      The GCHQ (Government Communications Headquarters) is not very well known outside of the United Kingdom. The governmental organization is almost a century old (it will celebrate its 100th anniversary...
      Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
      ElevenPaths

      Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

      This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • What Is Wrong with Quantum Cryptography That the World's Largest Intelligence Agencies Discourage Its Use
      Gonzalo Álvarez Marañón

      What Is Wrong with Quantum Cryptography That the World’s Largest Intelligence Agencies Discourage Its Use

      Quantum cryptography does not exist. What everyone understands when the term “quantum cryptography” is mentioned is actually the quantum key distribution (QKD). And this is precisely what I want...
      Cyber Security Weekly Briefing February 13-19
      ElevenPaths

      Cyber Security Weekly Briefing February 13-19

      ​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • SASE: The future of networks and security is now here
      ElevenPaths

      SASE: The Future of Networks and Security Is Now Here

      Since Gartner published their report entitled “The Future of Security Networks is in the Cloud” in August 2019, which pointed out the concept of SASE as the key to...
      Apple introduces up to 14 signatures in XProtect given the malware flood for Mac
      Sergio de los Santos

      Apple introduces up to 14 signatures in XProtect given the malware flood for Mac

      What is Apple doing about Shlayer malware? We analyze the main tools that MacOS is using to face this threat.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)
Innovation and Laboratory Area in ElevenPaths

46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)

Over the past few months, many IT departments have been busy carrying out this task of adaptation in order to comply with the new regulations on cookies. Every time...
WhatsApp terms and conditions update - a cheeky move?
Carlos Ávila

WhatsApp Terms and Conditions Update: A Cheeky Move?

Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data,...
Cyber Security Weekly Briefing January 2-8
ElevenPaths

Cyber Security Weekly Briefing January 2-8

SolarWinds Update To end the year, Microsoft published an update of its findings regarding the impact of the SolarWinds incident on its systems. In this release, it emphasizes that neither...
The First Official Vulnerabilities in Machine Learning in General
Franco Piergallini Guida

The First Official Vulnerabilities in Machine Learning in General

Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
Cyber Security Weekly Briefing December 12-18
ElevenPaths

Cyber Security Weekly Briefing December 12-18

Supply Chain compromise: SolarWinds Orion FireEye researchers have unveiled a major global information theft and espionage operation that takes advantage of the supply chain to gain access to the systems...
Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity
Gonzalo Álvarez Marañón

Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity

The doorbell rang. “Who will be ringing now?” asked Brittney Mills, as she struggled to get off the couch. Her eight months of pregnancy were beginning to hinder her...
ElevenPaths Radio English #5 - The Path After a Security Audit
ElevenPaths

ElevenPaths Radio English #5 – The Path After a Security Audit

What is the path for a company after a security audit? It is increasingly common for companies of all sizes to decide to carry out such analyses, but what...
Cyber Security Weekly Briefing December 5-11
ElevenPaths

Cyber Security Weekly Briefing December 5-11

Microsoft Security Newsletter On December 8, Microsoft published its monthly security update newsletter, which this time includes patches for 58 vulnerabilities and an advisory for various Microsoft products. Nine of...
What Is Wrong with Quantum Cryptography That the World's Largest Intelligence Agencies Discourage Its Use
Gonzalo Álvarez Marañón

What Is Wrong with Quantum Cryptography That the World’s Largest Intelligence Agencies Discourage Its Use

Quantum cryptography does not exist. What everyone understands when the term “quantum cryptography” is mentioned is actually the quantum key distribution (QKD). And this is precisely what I want...
ElevenPaths

Cyber Security Weekly Briefing 28 November – 4 December

New version of the TrickBot malware TrickBot botnet operators have added a new capability that allows them to interact with the BIOS or UEFI firmware of an infected computer. This...

Navegación de entradas

Previous articles
1 … 21 22 23 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration