Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Shaping IoT: 2G refarming. What does it mean? How can we bring Internet of Things to the rural world?
  • Big Data
    • How has the NFL Super Bowl evolved with the introduction of Big Data? The 6 data-driven pioneers of politics
  • Cybersecurity
    • What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You? Cyber Security Weekly Briefing, 3 – 9 December

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Beatriz Sanz Baños

Tracking of goods for the tranquility of the consumer

Electronic commerce plays an increasingly important role in the business of companies. In fact, the number of people who buy online at least once a week has increased more...
Beatriz Sanz Baños

Safer, but not immune

Technological advances, and specifically IoT, are designed to give us more time, increase our comfort, and improve our quality of life. The digital transformation has managed improved our lives...
AI of Things

A history of Lisp and its use in neural networks – Part II

Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Last month, we started a two-article series talking about Lisp. Part I covered the history, its beginnings and uses when it comes...
AI of Things

What GDPR laws mean for you

Post written by Rodrigo Machado – Head of Technology, Mobile Advertising General Data Protection Regulation – GDPR, the new EU regulation that has been designed to update the existing data...
Beatriz Sanz Baños

IOT Worker’s Diary

07:00 am. Daniel opens his eyes for the first time while he’s listening to his favourite song and he goes back to sleep with a big smile. “Only five minutes...
AI of Things

Data Roles: Which is the right one for you?

The world of Data, Machine Learning and Artificial Intelligence is so vast and varied, that it becomes necessary to define different profiles. Throughout this post we will describe each...
ElevenPaths

CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques

Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
Beatriz Sanz Baños

The future of Internet of Things

Looking at just how much the internet has changed our lives, it’s incredible to imagine how some people didn’t took it seriously at the beginning. One of the reasons...
AI of Things

Traffic spikes before football games? The effect of the World Cup in Germany

Post written by Telefónica NEXT  Once every four years, The FIFA World Cup brings fans together in a month of surprising events. Every game is different, but each is filled...
Beatriz Sanz Baños

Say goodbye to traffic jams

The hours that we lose in traffic jams in big cities would be better used in what really matters to us thanks to the Internet of Things. We are talking...

Navegación de entradas

Previous articles
1 … 88 89 90 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration