Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is Tank Telemetry? 10 features that the city of the (near) future will have
  • Big Data
    • AI of Things for smart and sustainable water management Are you ready to become the CDO? Applying Analytics to the CDO role
  • Cybersecurity
    • A Trillion-Dollar on Offer to the Puzzle Solver New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Cybersecurity Weekly Briefing July 4-10
ElevenPaths

Cybersecurity Weekly Briefing July 4-10

RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10)  was published for F5’s Traffic Management User Interface (TMUI). This vulnerability allows...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
ElevenPaths

ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?
Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
ElevenPaths

Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security

The investment reinforces an earlier joint services agreement with Nozomi Networks and ElevenPaths, Telefónica Tech’s cybersecurity company
Olivia Brookhouse

IoT and Big Data in football to enable intelligent decision making

IoT and Big Data in sport are becoming ever more prevalent, bringing value to not only players but spectators too. Football, although a seemingly basic sport with a just...
OpenPGP: Desperately Seeking Kristian
Sergio de los Santos

OpenPGP: Desperately Seeking Kristian

Open Source applications run on a server system that has never worked properly. Why does this happen?
ElevenPaths

Cybersecurity Weekly Briefing June 27-July 3

Adobe, Mastercard and Visa Warn of the Need to Upgrade to Magento 2.x Payment providers Visa and Mastercard, together with Adobe, have tried for the last time to convince online...
New Call: ElevenPaths CSE Programme
ElevenPaths

New Call: ElevenPaths CSE Programme

If you are passionate about cybersecurity, join the ElevenPaths CSE programme and enjoy all its benefits. Don't miss it!
COVID-19, Insight from the Telco Security Alliance
ElevenPaths

COVID-19, Insight from the Telco Security Alliance

How have cybercriminals behaved during the COVID-19 pandemic? Find out in this ElevenPaths report with Alien Labs and Trustwave.

Navegación de entradas

Previous articles
1 … 55 56 57 … 123
More articles
  • Telefónica Tech

Popular

MATSUKO
Innovation Marketing Team
MATSUKO, a brand-new winner for the SXSW Pitch 2022 Awards, spotted at MWC Barcelona
MATSUKO is the world’s first real-time hologram meeting app that requires only an iPhone to capture and stream people’s holograms. Using mixed and augmented reality and artificial intelligence, the...
Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration