Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT to save the environment Kevin Ashton just asks companies to use the IoT
  • Big Data
    • AI of Things (V): Recommendation and optimisation of advertising content on smart displays New ways of working with Artificial Intelligence
  • Cybersecurity
    • Cyber Security Weekly Briefing January 16-22 #CyberSecurityPulse: Google’s project to fight election attacks
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity for everyone

ChainLock, A Linux Tool for Locking Down Important Files
Innovation and Laboratory Area in ElevenPaths

ChainLock, A Linux Tool for Locking Down Important Files

Let’s say you have a valuable file on your computer, such as a bitcoin wallet file (“wallet.dat”), or some other file with sensitive information, and you decide put a...
DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
Innovation and Laboratory Area in ElevenPaths

DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
Has the Office as We Know It Come to an End?
Miguel Ángel Martos

Has the Office as We Know It Come to an End?

2020 has had a difficult start. We have learned that what was “usual” may not be the best. We should reconsider this idea of “the office” as the centre...
Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
ElevenPaths

Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
Adversarial Attacks: The Enemy of Artificial Intelligence (II)
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence (II)

In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
Cybersecurity Weekly Briefing September 19-25
ElevenPaths

Cybersecurity Weekly Briefing September 19-25

New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralized World
Gonzalo Álvarez Marañón

Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

In the Renaissance Italy, duels between mathematicians were common, but not by crossing steels, but by solving difficult problems. One of the hardest bones to crack at the time...
Redefining Cloud Security with SASE
Samuel Bonete

Redefining Cloud Security with SASE

Stop for a moment and think: what percentage of your Internet traffic ends up on websites or traditional browsing and what proportion on SaaS services? If we analyse it...
Cybersecurity for industrial digitalisation: keys to a successful approach
ElevenPaths

Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...
Analysis of APPs Related to COVID19 Using Tacyt (II)
Andrés Naranjo

Analysis of APPs Related to COVID19 Using Tacyt (II)

We continue with the research started in the previous entry in which we analysed these type of applications with our Tacyt tool. Regarding the application analysed, we can see...

Navegación de entradas

Previous articles
1 … 22 23 24 … 33
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration