Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is the difference between M2M and IoT? IoT Trends for 2017, users in the spotlight
  • Big Data
    • LUCA Talk 1: Using Big Data to understand mobility and pollution LUCA partners with Pelephone to bring Big Data services to Israel
  • Cybersecurity
    • Top 4 Programming Languages for Beginners Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths at RSA Conference 2020
      ElevenPaths

      ElevenPaths at RSA Conference 2020

      Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...
      ElevenPaths

      Cybersecurity Weekly Briefing October 17-23

      New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar techniques to...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
      Gonzalo Álvarez Marañón

      How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

      When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
      Bestiary of a Poorly Managed Memory (I)
      David García

      Bestiary of a Poorly Managed Memory (I)

      WannaCry, EternalBlue, Conficker... their cyber attacks have one thing in common: the arbitrary code execution. Discover how they happen.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • SASE: The future of networks and security is now here
      ElevenPaths

      SASE: The Future of Networks and Security Is Now Here

      Since Gartner published their report entitled “The Future of Security Networks is in the Cloud” in August 2019, which pointed out the concept of SASE as the key to...
      Telefónica Tech

      Cyber Security Weekly Briefing, 4 – 10 February

      Critical vulnerability in Atlassian Jira Atlassian has issued a security advisory in which it releases fixes to resolve a critical vulnerability in Jira Service Management Server and Data Center. According to...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

CARMA: Our Free Research-Focused Set of Android Malware Samples
Innovation and Laboratory Area in ElevenPaths

CARMA: Our Free Research-Focused Set of Android Malware Samples

Introducing CARMA, our free research-focused set of Android malware samples to enhance research into malware, adware and PUP detection.
Fake News and Cyberthreats in Times of Coronavirus
Helene Aguirre

Fake News and Cyberthreats in Times of Coronavirus

Helene Aguirre tells you how cyberthreats never stop, even in the case of a global pandemic health alert.
10 Tips for Secure Homework in Your Company
ElevenPaths CSAs

10 Tips for Secure Homeworking in Your Company

We tell you ten measures you can take to make homeworking secure for your company, employees and customers.
How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus
ElevenPaths

How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus

The overinformation caused by the huge amount of news we receive about coronavirus makes it harder to distinguish true from fake emails. This poses a great risk to people’s security, since it...
Cybersecurity Trends Report for 2020 from ElevenPaths
ElevenPaths

Cybersecurity Trends Report for 2020 from ElevenPaths

Discover the technologies and attacks that will most affect security in the coming months in this report.
Secure Telework, Applying Cybersecurity from Home
Andrés Naranjo

Secure Homeworking, Applying Cybersecurity from Home

Working from home makes it easier to reconcile these difficult days, but safety should not be overlooked. Telework safely with these tips.
More and shorter certificates with a lower lifetime: where is TLS going to?
Sergio de los Santos

More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
Trend Report: Hacktivist CyberThreats Report 2019
ElevenPaths

Trend Report: Hacktivist CyberThreats Report 2019

An analytical report that includes the periodic scanning of the hacktivist threat’s behavior in five observation rings: Europe and the United Kingdom, North America, Latin America, MENA / Asia...
What differential privacy is and why Google and Apple are using it with your data
Gonzalo Álvarez Marañón

What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
ElevenPaths at RSA Conference 2020
ElevenPaths

ElevenPaths at RSA Conference 2020

Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...

Navegación de entradas

Previous articles
1 … 35 36 37 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration