Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Tech was Present at Advanced Factories 2021 With Its Proposal For The Industrial Sector GSMA IoT Security Champion: Award to our IoT Security team
  • Big Data
    • Axonix acquire mobile geolocation startup Statiq Artificial Intelligence: What even is that?
  • Cybersecurity
    • Name the malware you have, and I’ll tell you which botnet you belong to #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

IoT-care
Miguel Maroto

How can IoT help with elderly care?

In this second article I want to share another life experience where the technology in which I am an expert helps both to care for and make life easier...
Cyber Security Report 1º April
Telefónica Tech

Cyber Security Weekly Briefing 26 March- 1 April

Spring4Shell vulnerability Spring has released security updates for the 0-day remote code execution (RCE) flaw known as Spring4Shell. Since the appearance of the vulnerability, unconfirmed information has been released from different...
Telefónica Tech

Affordable fleet management for Spanish SMEs

We live in a fast-changing environment. Spanish SMEs have sharpened their wits to stay in the business after the pandemic. Most of them have begun a process of digitalisation...
María Teresa Nieto Galán

Facts and lies about the famous concept of NFTs

The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
Telefónica Tech

Cyber Security Weekly Briefing 19-25 March

Privilege escalation vulnerability in Western Digital Independent security researcher Xavier Danest has reported a privilege escalation vulnerability in EdgeRover. It should be mentioned that EdgeRover is a software developed by storage products...
Mark Skelton

3 Key Cyber Security Considerations

To tackle cyber security effectively, we need to find new ways to meet the cyber challenges facing all of us. As CTO for Telefónica Tech UK&I, I regularly speak...
Sandra Tello

Towards a green digital transformation

COVID-19 has created challenges that were previously unimaginable, but it has also given us an incredible opportunity to reinvent and rebuild ourselves. In my last blog post we saw...
ElevenPaths

Cyber Security Weekly Briefing 12-18 March

Vishing by impersonating Microsoft The Office of Internet Security (OSI) has issued a security advisory to report an increase, in recent weeks, of fraudulent calls in which a supposed Microsoft...
Telefónica Tech's Innovation and Laboratory Area

#CyberSecurityReport2021H2: Log4Shell, the vulnerability that has exposed the software’s reliance on altruistically maintained libraries and their enormous security impact.

There are many reports on security trends and security summaries, but Telefónica Tech wants to make a difference. The Innovation and Lab team has just launched our own report...
Francisco Ibáñez González

AI of Things (II): Water, a sea of data

Water management companies have been adapting the way they manage their processes according to the evolution, costs and availability of technology in each part of their value chain. It...

Navegación de entradas

Previous articles
1 … 23 24 25 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
(re) Introducing Evil Foca (DEFCON Edition)
Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration