Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT is on your head MWC21: 5G and digital technologies, a reality for the post-covid recovery
  • Big Data
    • Our top 5 Big Data blogs How to learn Python: the most important skill for employers
  • Cybersecurity
    • #CyberSecurityPulse: Last Update About Bad Rabbit Ransomware When I grow up I want to be… Engineer

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Global

Telefónica Tech

Cyber Security Weekly Briefing 15–21 january

Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero

Deep Learning in Star Wars: May Computation Be With You

Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Carlos Martínez Miguel

Artificial Intelligence 2022: myths and realities

We are only in the early stages of AI development, but its impact is already huge When making predictions in the technological field, it is always advisable to start by...
Antonio Ramírez

The digitisation of predictive technology: digital twins

I still remember talking to my colleague Miguel Mateo after his presentation at the Telefónica Tech stand at MWC21 (Mobile World Congress 2021) about how the union of Predictive...
Telefónica Tech

Cyber Security Weekly Briefing 28-31 december

Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...
Telefónica Tech

Cyber Security Weekly Briefing 18 – 24 December

Log4Shell Vulnerability (update) Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1...
Jorge González

How can we make water consumption more efficient?

Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient. Water...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Alexandre Maravilla

Onboarding and biometric authentication to fight online fraud

Online fraud has experienced a significant growth since the early 2020s pandemic accelerated the digital transformation of businesses and citizens. This is evidenced by the latest report from the...
Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...

Navegación de entradas

Previous articles
1 … 3 4 5 … 7
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration