Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 10 features that the city of the (near) future will have Now cycling is safer thanks to drones and IoT
  • Big Data
    • Could Artificial Intelligence be used to prevent suicide? What does Big Data tell us about the way people move around Brazil’s favelas?
  • Cybersecurity
    • Detected an extension in Chrome Web Store, active from February, that steals credit cards Laboratory Information Management System (LIMS) and its Mobile Applications
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

Social Media Day
Marina Salmerón Uribes

What we should remind ourselves of on International Social Media Day

Today is the international day of social networks, tools that have changed our day-to-day personal and professional lives and from which we find it hard to detach ourselves. On...
Ransomware cyber security
Sergio de los Santos

What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon

In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
Cyber Security Weekly Briefing June 19-25
ElevenPaths

Cyber Security Weekly Briefing June 19-25

SonicWall fixes a critical vulnerability that had been partially fixed In October last year, SonicWall fixed a critical buffer overflow vulnerability in SonicOS under the identifier CVE-2020-5135, which affected more than...
MWC
Bernardo Campillo

Telefónica Tech At MWC: Economic and Social Recovery Are Our Priorities

After a year of forced suspension due to health circumstances, in 2021 the world’s leading telecommunications and technology event will be held once again: the Mobile World Congress in...
Financial Institutions Fcase
Barry Bowen

Fraud Orchestration is Helping Financial Institutions Fight Fraud in Real-Time

Banking has gone digital. In 2019, financial institutions are leveraging technology more than ever to provide the type of customer experience being demanded by today’s consumer market. The financial...
ElevenPaths

Cyber Security Weekly Briefing June 12-18

0-day vulnerability in Chrome, the seventh so far this year Yesterday, June 17, Google released version 91.0.4472.114 of Chrome for Windows, Mac and Linux, resolving a 0-day vulnerability classified as...
Telefónica Tech
Telefónica Tech

Telefónica Tech, the new technologies blog

They say that together we are stronger, and at Telefónica Tech we have realised about this. Good support is always a safe bet to strengthen the path, and if...
cyber security app iotm
Carlos Ávila

IoTM Mobile Applications and The Relevance Of Their Security

Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
ElevenPaths

DevSecOps: 7 Key Factors for Implementing Security in Devops

DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
Apps videocalls
Antonio Gil Moyano

Security in video call applications: Microsoft Teams, Zoom and Google Meet

There is no doubt that instant messaging programmes have become an essential communication tool in our personal and professional lives. There is also no doubt that video calling applications,...

Navegación de entradas

Previous articles
1 … 21 22 23 … 55
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
(re) Introducing Evil Foca (DEFCON Edition)
Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration