Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The 10 best blogposts of 2017 IoT Trends for 2018, connectivity in the limelight
  • Big Data
    • Four design principles for developing sustainable AI applications The best-bits of Changing the Game with Big Data Valencia!
  • Cybersecurity
    • 5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution Cyber Security Weekly Briefing 31 July-13 August
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Gabriel Bergel

Infosec Rockstar, ISC2 Board of Directors, 8dot8 Co Founder, ElevenPaths CSA, CCI Coordinator, host of the #8punto8 radio program of RadioDemente.cl



malware
Gabriel Bergel

Mobile Malware, part of the Generation Z

Generation Z or “post Millenials” is the demographic group born between 1994 and 2010, mobile malware was born in 2004 with Cabir, the first virus to affect Symbian Series 60 phones....
Digital Zombies and Social Engineering
Gabriel Bergel

Digital Zombies and Social Engineering

This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you credit it, and I loved it. We...
¿Ransomware in Pandemic or Ransomware Pandemic?
Gabriel Bergel

¿Ransomware in Pandemic or Ransomware Pandemic?

No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
Cybersecurity and Pandemic (II)
Gabriel Bergel

Cybersecurity and Pandemic (II)

We continue with the second part of this article in which we analyse the current situation in its three dimensions. Let’s remember that in the first part of the...
Cybersecurity and Pandemic (I): People
Gabriel Bergel

Cybersecurity and Pandemic (I): People

Cybersecurity is even more important in these times of pandemic and increasing cyberattacks, yes, but in addition to being a business focus at the corporate level, it must also...
Decepticons vs. Covid-19: The Ultimate Battle
Gabriel Bergel

Decepticons vs. Covid-19: The Ultimate Battle

Social engineering is being used more than ever by cybercriminals. What do Decepticons have to do with it?
Risk Analysis Applied to COVID-19
Gabriel Bergel

Risk Analysis Applied to COVID-19

Our CSA Gabriel Bergel shows you how to apply the Risk Analysis methodology to the management of the COVID-19 threat.

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration