Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT: our elders best ally What role will Data Governance play in the Digital Transformation after COVID-19?
  • Big Data
    • Data Roles: Which is the right one for you? Mum, when I grow up I want to be a hacker
  • Cybersecurity
    • Cyber Security Weekly Briefing February 13-19 The importance of access control: is your company protected?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity Latest Investigations

Using Development Libraries to Deploy Malware
Diego Samuel Espitia

Using Development Libraries to Deploy Malware

Cybercriminals seek strategies to achieve their objectives: in some cases, it is users’ information; in others, connections; sometimes they generate networks of computers under their control (botnets), etc. Any...
A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio de los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America
Andrés Naranjo

Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America

“It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of...
Curiosities About Windows XP Code Leak
ElevenPaths

Curiosities About Windows XP Code Leak

A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
Gonzalo Álvarez Marañón

How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
Cybersecurity Weekly Briefing 29 August-4 September
ElevenPaths

Cybersecurity Weekly Briefing 29 August-4 September

Red Dawn, new attached document from Emotet The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph...
Cybersecurity Weekly Briefing August 22-28
ElevenPaths

Cybersecurity Weekly Briefing August 22-28

Conti ransomware distributed after Trickbot Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when...
Cybersecurity Weekly Briefing August 15-21
ElevenPaths

Cybersecurity Weekly Briefing August 15-21

EmoCrash: stopping Emotet for almost 6 months Emotet’s comeback after a 6 month-period absence has hinted that the hiatus in the malware’s operations could be due to the discovery of...
Cybersecurity Weekly Briefing August 8-14
ElevenPaths

Cybersecurity Weekly Briefing August 8-14

Hackers attempt to exploit critical vulnerability in F5 BIG-IP ADC The FBI has issued a Private Industry Notification warning that a group of Iranian hackers have been trying to exploit...
Innovation and Laboratory Area in ElevenPaths

ClipBanker Malware Tries to Stop Our Defence Tool CryptoClipWatcher

The malware capable of modifying the clipboard to “switch” the crypto wallet still exists. To fight it, ElevenPaths developed CryptoClipWatcher, a tool that monitors the clipboard and alerts if...

Navegación de entradas

Previous articles
1 2 3 … 7
More articles
  • Telefónica Tech

Popular

Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
Miryam Artigas
Using Midjourney to create social media content
Any sentence containing the word ‘dinosaur’ is worthy of attention. Admit it, it happens to you too. And if not, I’ll tell you why we’re talking about dinosaurs in a...
Two men working with computer
New Markets Team
Human Factors in Cybersecurity: Protect Yourself
Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Image from No Man's Sky video game
Javier Coronado Blazquez
Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games
The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
cocacola
AI of Things
Coca-Cola’s use of AI to stay at the top of the drinks market
Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration