Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • eSIM cards are here to boost the IoT The importance of labeling: spotlabel
  • Big Data
    • Using Data to Manage Emergency Situations LUCA Talk 4: Disrupting Mobile Advertising with data-driven solutions
  • Cybersecurity
    • The importance of access control: is your company protected? Frequently Asked Questions About Printnightmare (CVE-2021-34527)

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

The risks of not having controlled exposure to information (III)
Susana Alwasity

The risks of not having controlled exposure to information (III)

Finally comes the last and long-awaited post in this series on the risks of uncontrolled information overexposure. As we saw in the previous post, we know how to minimise...
Paloma Recuero de los Santos

IoT and Big Data: What’s the link?

The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
Telefónica Tech

Cyber Security Weekly Briefing 15–21 january

Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero

Deep Learning in Star Wars: May Computation Be With You

Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Cyber Security Weekly Briefing 8–14 january
Telefónica Tech

Cyber Security Weekly Briefing 8–14 january

Microsoft security bulletin Microsoft has published its January security bulletin in which it has fixed a total of 97 bugs, including six 0-day vulnerabilities and nine bugs classified as critical....
The risks of not having controlled exposure to information
Susana Alwasity

The risks of not having controlled exposure to information (I)

Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
Carlos Martínez Miguel

Artificial Intelligence 2022: myths and realities

We are only in the early stages of AI development, but its impact is already huge When making predictions in the technological field, it is always advisable to start by...
Antonio Ramírez

The digitisation of predictive technology: digital twins

I still remember talking to my colleague Miguel Mateo after his presentation at the Telefónica Tech stand at MWC21 (Mobile World Congress 2021) about how the union of Predictive...
Cyber Security Weekly Briefing 4 – 7 january
Telefónica Tech

Cyber Security Weekly Briefing 1–7 january

Mail delivery failure on Microsoft Exchange on-premises servers 2 January, Microsoft released a workaround to fix a bug that interrupted email delivery on Microsoft Exchange on-premises servers. The bug is a “year...
Telefónica Tech

Cyber Security Weekly Briefing 28-31 december

Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...

Navegación de entradas

Previous articles
1 … 26 27 28 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration