Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart football stadiums: the world’s greatest show, made even better IoT to save the environment
  • Big Data
    • Big Data: Revolutionizing Animal Conservation Business Messaging – From humble SMS to conversational commerce
  • Cybersecurity
    • Cryptography, a tool for protecting data shared on the network  Cybersecurity in films: myth vs. reality with 10 examples

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

Alexandre Maravilla

Digital Identity Wallets against identity theft fraud

Identity theft or impersonation is a type of fraud in which criminals manage to supplant the identity of the person being deceived, based on the theft of their personal...
Telefónica Tech

Cyber Security Weekly Briefing 29 January – 4 February

Exploits that allow privilege elevation in Windows published Security researchers have made public several exploits that leverage a known elevation of privilege vulnerability that affects all versions of Windows 10. The exploits...
Cyber Security Weekly Briefing 22-28 january
Telefónica Tech

Cyber Security Weekly Briefing 22-28 January

New vulnerabilities in Linux Two new vulnerabilities of risk have recently been disclosed and are reportedly affecting Linux systems. If exploited, they could allow privilege escalation on the vulnerable system. CVE-2021-4034...
shopping " securely " on the Internet
Martiniano Mallavibarrena

Are we really shopping ” securely ” on the Internet?

Once Black Friday, Singles’ Day (if you have Chinese roots or any kind of relationship to it) and Christmas are over, I’m sure the vast majority of us have...
The risks of not having controlled exposure to information (III)
Susana Alwasity

The risks of not having controlled exposure to information (III)

Finally comes the last and long-awaited post in this series on the risks of uncontrolled information overexposure. As we saw in the previous post, we know how to minimise...
Paloma Recuero de los Santos

IoT and Big Data: What’s the link?

The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
Telefónica Tech

Cyber Security Weekly Briefing 15–21 january

Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero

Deep Learning in Star Wars: May Computation Be With You

Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Cyber Security Weekly Briefing 8–14 january
Telefónica Tech

Cyber Security Weekly Briefing 8–14 january

Microsoft security bulletin Microsoft has published its January security bulletin in which it has fixed a total of 97 bugs, including six 0-day vulnerabilities and nine bugs classified as critical....
The risks of not having controlled exposure to information
Susana Alwasity

The risks of not having controlled exposure to information (I)

Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...

Navegación de entradas

Previous articles
1 … 18 19 20 … 27
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration