Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things for smart and sustainable water management Say goodbye to traffic jams
  • Big Data
    • A digital twin to save the Mar Menor The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)
  • Cybersecurity
    • The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography Cybersecurity Weekly Briefing June 20-26
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity

Cybersecurity

Top 3 cyber security posts
Telefónica Tech

Top 3 most read cybersecurity posts this year

In our weekly summer compilation with the most relevant and most read contents of the Telefónica Tech blog since the beginning of this year, this time we bring you...
Photo: Icons8 Team / Unsplash
Cristina del Carmen Arroyo Siruela

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Cyber Security Weekly Briefing august
Telefónica Tech

Cyber Security Weekly Briefing, 30 July – 5 August

Possible link between Raspberry Robin malware and Evil Corp infections The Microsoft Threat Intelligence Center (MSTIC) team has published new information about the Raspberry Robin malware, first detected by the...
Photo: Bruno Gomiero / Unsplash
José Vicente Catalán

You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer

Holidays are a necessity, that’s for sure. Everyone needs to relax, to spend quality time with family and friends, to disconnect. But, ironically, in order to disconnect, we end...
Cyber Security Weekly Briefing 29 July
Telefónica Tech

Cyber Security Weekly Briefing, 23-29 July

New Critical Vulnerability in SonicWall Products Researchers from DBappSecurity HAT lab have discovered a critical vulnerability that affects several SonicWall Analytics On-Prem and SonicWall Global Management System products. The vulnerability, a...
Photo: Craig Garner / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 16 — 22 July

Lightning Framework: new malware targeting Linux environments Researchers at Intezer have published information about a new type of malware targeting Linux environments, which they have named Lightning Framework. While the...
Photo: This is Engineering RAEng / Unsplash
Diego Samuel Espitia

What are operational technology (OT) security “Patch Tuesdays”?

In the cybersecurity world we are used to the release of packages that fix vulnerabilities detected in business software. One of the releases that has established a periodicity and...
Photo: Christina Wocintechchat.com / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 9 — 15 July

Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
Photo: Tyler Daviaux / Unsplash.
Sergio de los Santos

Hypocrisy doublespeak in ransomware gangs

The hypocrisy, doublespeak and even, we assume, sarcasm that ransomware gangs display on their websites has no limits. As an anecdote, we are going to show some of the...
Photo: Dan Nelson / Unsplash
Cristina del Carmen Arroyo Siruela

Understanding Digital Certificates

For ordinary citizens, digital certificates are those electronic files or documents that allow them to carry out thousands of legal actions, administrative actions, and they can dispense with having...

Navegación de entradas

Volver a portada
1 2 … 48
More articles
  • Telefónica Tech

Popular

Fictional image generated by Dall-E 2, OpenAI's artificial inteligence.
Nacho Palou
The artificial intelligence Dall-E turns any idea expressed in a sentence into an image
Open AI shows some images generated by the Dall-E artificial intelligence when interpreting creative ideas expressed in natural language
A little girl with a robot. Phoyo: Andy Kelly / Unsplash
Paloma Recuero de los Santos
How should you speak to children about Artificial Intelligence?
In previous years, people’s relationship with technology in general, and with artificial intelligence in particular, was based on “text”, usually using specialised programming languages. Today, however, artificial intelligence has...
A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo
Dark Markets in the internet age
What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
AI of Things
5 AI uses in Photography
On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration