Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • FIWARE, the standard that IoT needs Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone
  • Big Data
    • How has the NFL Super Bowl evolved with the introduction of Big Data? 5th Annual CDO Forum in London will see Chema Alonso take to the stage
  • Cybersecurity
    • #CyberSecurityPulse: Oops, I Went Running and I Published Information From Secret Locations The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

The Pharmaceutical Retail Industry and Their Mobile Applications
Carlos Ávila

The Pharmaceutical Retail Industry and Their Mobile Applications

Are users of pharmaceutical applications safe in terms of data security and privacy? Discover this analysis from our CSA Carlos Ávila.
Business Continuity Plan: From Paper to Action
Diego Samuel Espitia

Business Continuity Plan: From Paper to Action

How many Business Continuity Plans considered a global pandemic among the possible causes of business blockage?
Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
Rafael Ortiz

How to Make API REST Requests to Tor Hidden Services in an Android APK

If you are a developer and want to test your Android app with a Tor hidden service, here's how.
CapaciCard Is Already Working on iPhone
Innovation and Laboratory Area in ElevenPaths

CapaciCard Is Already Working on iPhone

Can you imagine authenticating yourself or authorizing a payment by simply swiping a card on your iPhone screen? CapaciCard makes it possible.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
TypoSquatting: Using Your Brain to Trick You
Diego Samuel Espitia

TypoSquatting: Using Your Brain to Trick You

Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.
DIARIO: Our Privacy-Friendly Document Malware Detector
Innovation and Laboratory Area in ElevenPaths

DIARIO: Our Privacy-Friendly Document Malware Detector

DIARIO makes possible to scan and analyse documents for malware detection with no need to know the content of those files.. Find out more in this post.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.
IoT Device Search Engines: Why Choose if We Can Use All of Them?
Nacho Brihuega

IoT Device Search Engines: Why Choose if We Can Use All of Them?

Nacho Brihuega explains how to use IoT device search engines to detect vulnerabilities and the functioning of a script that will make your research easier.
Bestiary of a Poorly Managed Memory (I)
David García

Bestiary of a Poorly Managed Memory (I)

WannaCry, EternalBlue, Conficker... their cyber attacks have one thing in common: the arbitrary code execution. Discover how they happen.

Navegación de entradas

Previous articles
1 … 41 42 43 … 55
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration