Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What connected intelligence can do in your home Reviewing what makes a smart city smart
  • Big Data
    • III Impact Innovation Talks: Big Data’s new challenges, achievements and opportunities #LanzamosLUCA: Dave Sweeney on using Mobile Data to disrupt Transport and Tourism
  • Cybersecurity
    • The Malware Created in Go Is A Trend And Is Here To Stay Cyber Security Weekly Briefing, 8 – 14 April

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
diversity technology field
Sandra Tello

The COVID crisis and diversity in the technology field

The pandemic has highlighted the need for STEM profiles The coronavirus pandemic is estimated to have accelerated digitalisation by 5 to 10 years. This means that the technology sector will...
Telefónica Tech

Cyber Security Weekly Briefing 4 – 10 December

Catalan government suffers DDoS attack According to the statement issued by the Catalan government, the Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) detected last Friday a cyber-attack that compromised more...
Roberto García Esteban

Cloud services enabling remote working

There is no doubt that the hybrid model in which face-to-face and remote work is shared is here to stay in companies all over the world, including SMEs. To...
Cyber Security Weekly Briefing 20-26 November
Telefónica Tech

Cyber Security Weekly Briefing 27 November – 3 December

Apple and Google fined 20 million for using user data The Italian Competition and Market Authority (AGCM) has fined both Google and Apple 10 million euros for their method of...
The impact of cybersecurity attacks on SMEs and corporates
New Markets Team

The impact of cybersecurity attacks on SMEs and corporates

New Markets from Telefónica Cyber & Cloud Tech, together with Telefónica Global Solutions and GlobalData delivered a webinar highlighting the impact of cybersecurity attacks on both small and medium-sized...
TCP/IP
Diego Samuel Espitia

TCP/IP Stack Gruyere

In May 2020 during the most complicated phase of the global pandemic, we were told that the internet was broken as a result of bugs (called Ripple20) affecting millions...
#LadyHacker final
Telefónica Tech

#LadyHacker: Proud of you all

#LadyHacker 2021 campaign is coming to an end. Throughout this year we have followed the lives of our women, from their childhood to their maturity, including their school and...
Cyber Security Weekly Briefing 20-26 November
Telefónica Tech

Cyber Security Weekly Briefing 20-26 November

Reacharound: possible resurgence of the triple threat Trickbot-Emotet-Ransomware Last January, an international action orchestrated by Europol and Eurojust led to the dismantling of the Emotet infrastructure, a malware widely used...
Black Friday Social
Martiniano Mallavibarrena

Technology and social psychology applied to Internet consumption: The ” Black Friday” case

No one will be surprised if we suggest that social networks and other large Internet platforms base their business model on advertising and that all of them, in some...

Navegación de entradas

Previous articles
1 … 20 21 22 … 27
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration