Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Fleet Optimise for Rent-a-car Companies Barcelona, Singapore and Amsterdam: sustainable cities thanks to Internet of Things
  • Big Data
    • Artificial Intelligence to fight pandemics Big Data combating crime in New York
  • Cybersecurity
    • Cyber Security Weekly Briefing January 23-29 We’re talking about technology, will you join the conversation?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Gonzalo Álvarez Marañón

      Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

      Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Innovation and Laboratory Area in ElevenPaths

      Five interesting own tools that you may have missed (and a surprise)

      This time we are going to rehash a blog entry by gathering some of the own tools that we have recently developed and we consider of interest. We summarize...
      Innovation and Laboratory Area in ElevenPaths

      EasyDoH: our new extension for Firefox that makes DNS over HTTPS simpler

      A year ago, the IETF has raised to RFC the DNS over HTTPS proposal. This new is more important than it may seem. For two reasons: firstly, it’s a...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing April 3-9
      ElevenPaths

      Cyber Security Weekly Briefing April 3-9

      Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
      Telefónica Tech

      Cyber Security Weekly Briefing 29 January – 4 February

      Exploits that allow privilege elevation in Windows published Security researchers have made public several exploits that leverage a known elevation of privilege vulnerability that affects all versions of Windows 10. The exploits...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

CARMA: Our Free Research-Focused Set of Android Malware Samples
Innovation and Laboratory Area in ElevenPaths

CARMA: Our Free Research-Focused Set of Android Malware Samples

Introducing CARMA, our free research-focused set of Android malware samples to enhance research into malware, adware and PUP detection.
Fake News and Cyberthreats in Times of Coronavirus
Helene Aguirre

Fake News and Cyberthreats in Times of Coronavirus

Helene Aguirre tells you how cyberthreats never stop, even in the case of a global pandemic health alert.
10 Tips for Secure Homework in Your Company
ElevenPaths CSAs

10 Tips for Secure Homeworking in Your Company

We tell you ten measures you can take to make homeworking secure for your company, employees and customers.
How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus
ElevenPaths

How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus

The overinformation caused by the huge amount of news we receive about coronavirus makes it harder to distinguish true from fake emails. This poses a great risk to people’s security, since it...
Cybersecurity Trends Report for 2020 from ElevenPaths
ElevenPaths

Cybersecurity Trends Report for 2020 from ElevenPaths

Discover the technologies and attacks that will most affect security in the coming months in this report.
Secure Telework, Applying Cybersecurity from Home
Andrés Naranjo

Secure Homeworking, Applying Cybersecurity from Home

Working from home makes it easier to reconcile these difficult days, but safety should not be overlooked. Telework safely with these tips.
More and shorter certificates with a lower lifetime: where is TLS going to?
Sergio de los Santos

More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
Trend Report: Hacktivist CyberThreats Report 2019
ElevenPaths

Trend Report: Hacktivist CyberThreats Report 2019

An analytical report that includes the periodic scanning of the hacktivist threat’s behavior in five observation rings: Europe and the United Kingdom, North America, Latin America, MENA / Asia...
What differential privacy is and why Google and Apple are using it with your data
Gonzalo Álvarez Marañón

What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
ElevenPaths at RSA Conference 2020
ElevenPaths

ElevenPaths at RSA Conference 2020

Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...

Navegación de entradas

Previous articles
1 … 35 36 37 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration