Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • Smart stores, the future of Retail FIWARE, the standard that IoT needs
  • Big Data
    • The data-driven transformation of businesses, a matter of survival The highlights of LUCA Innovation Day 2019. What did you miss?
  • Cybersecurity
    • DIARIO Already Detects “Stomped” Macros, But What Are They Exactly? Technically analysing a SIEM… are your logs secure?
Think Big / Business
  • Big Data & AI
    • Antonio Pita Lozano

      The data-driven transformation of businesses, a matter of survival

      Written by Antonio Pita During the Digital Enterprise Show (#TelefónicaEmpresasDES) celebrated in Madrid at the end of last month we had the opportunity to look at the state-of-the-art disciplines which surround the...
      LUCA

      The highlights of LUCA Innovation Day 2019. What did you miss?

      The third edition of LUCA Innovation Day took place on Wednesday the 16th of October, in which we presented the advances developed over the last year by the data...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Salmerón Uribes Marina

      Smart stores, the future of Retail

      In the information age, the retail sector, or what is the same, the commercialization of products and services, has been forced to leave behind the mere exhibition of products...
      Beatriz Sanz Baños

      FIWARE, the standard that IoT needs

      What is FIWARE? FIWARE is an open source initiative that works towards building a set of standards to develop Smart applications for different domains such as Smart Cities, Smart Ports,...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
      Innovation and Laboratory Area in ElevenPaths

      DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

      Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
      ElevenPaths

      Technically analysing a SIEM… are your logs secure?

      The SIEMs are usually utilized within highly secure of regulated environments, where regular log monitoring and analysis is required to search for security incidents. They help to make...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Cybersecurity Latest Investigations

The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong
Sergio De Los Santos

The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong

All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)
Innovation and Laboratory Area in ElevenPaths

46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)

Over the past few months, many IT departments have been busy carrying out this task of adaptation in order to comply with the new regulations on cookies. Every time...
Cyber Security Weekly Briefing January 2-8
ElevenPaths

Cyber Security Weekly Briefing January 2-8

SolarWinds Update To end the year, Microsoft published an update of its findings regarding the impact of the SolarWinds incident on its systems. In this release, it emphasizes that neither...
Using Development Libraries to Deploy Malware
Diego Samuel Espitia

Using Development Libraries to Deploy Malware

Cybercriminals seek strategies to achieve their objectives: in some cases, it is users’ information; in others, connections; sometimes they generate networks of computers under their control (botnets), etc. Any...
From MSS to MDR and Beyond
ElevenPaths

From MSS to MDR and Beyond

Cybersecurity continues to evolve and, at ElevenPaths, we adapt to these changes. In our view, cybersecurity today is at a crossroads. Despite increased awareness, focus and investment, many organizations...
A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio De Los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America
Andrés Naranjo

Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America

“It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of...
Curiosities About Windows XP Code Leak
ElevenPaths

Curiosities About Windows XP Code Leak

A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
Gonzalo Álvarez Marañón

How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
Cybersecurity Weekly Briefing 29 August-4 September
ElevenPaths

Cybersecurity Weekly Briefing 29 August-4 September

Red Dawn, new attached document from Emotet The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph...

Navegación de entradas

Volver a portada
1 2 … 6
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Patrick Buckley
How IoT technology is helping candy producers make sweet profits!
From chocolate bars to lollipops, gumdrops to Haribos, the confectionary industry is now worth an estimated 210$ billion worldwide. With the industry experiencing strong growth, it is no surprise...
WhatsApp terms and conditions update - a cheeky move?
Carlos Ávila
WhatsApp Terms and Conditions Update: A Cheeky Move?
Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data,...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths
How the “antimalware” XProtect for MacOS works and why it detects poorly and badly
Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility