Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • eSIM cards are here to boost the IoT The 10 best blogposts of 2017
  • Big Data
    • LUCA partners with Pelephone to bring Big Data services to Israel LUCA Talk 5: Transforming the Tourism Industry with Dynamic Insights
  • Cybersecurity
    • The hugest collection of usernames and passwords has been filtered…or not (I) Our Telegram channel CyberSecurityPulse has already a webpage

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

Telefónica Tech

Cyber Security Weekly Briefing 23-29 October

Google fixes two 0-days in Chrome browser Google has released a new Chrome update (95.0.4638.69) for Windows, Mac and Linux, which fixes 7 vulnerabilities, two of them being 0-days. Regarding...
Diego Samuel Espitia

Facebook affected by compromise of JavaScript development packages

Programming languages such as Python and JavaScript, which in 2021 are competing for the top spot according to programmer ratings, are found in the services that we find on...
Security Briefing
Telefónica Tech

Cyber Security Weekly Briefing 16-22 October

Zerodium interested in acquiring 0-days of Windows VPN software Information security company Zerodium has reported its willingness to purchase 0-day vulnerabilities targeting VPN service software for Windows systems: ExpressVPN, NordVPN...
Manageability
Gonzalo Fernández Rodríguez

Manageability: the importance of a malleable system in a Cloud Native world

We recently published the post Cloud Chestnuts in The Cloud, Or What It Means That My Software in which we tried to explain what the term Cloud Native meant...
Cyber Security Weekly Briefing 9-15 October
Telefónica Tech

Cyber Security Weekly Briefing 9-15 October

​​​Microsoft Security Bulletin Microsoft has published its security bulletin for the month of October in which it has fixed a total of 81 bugs in its software, including 4 0-day...
José Luis Núñez Díaz

Towards a smarter supply chain

One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
identity wallets
Alexandre Maravilla

Europe’s new digital identity; sovereign identity wallets

Have you ever stopped to think about how many user accounts we have on the Internet? Bank accounts, utility providers, Social Networks, email, e-commerce, … Nowadays we handle an...
Cloud September
Telefónica Tech

What have we learned about Cloud this September?

This new course has come loaded with knowledge for the Telefónica Tech blog. Thanks to our experts, we continue to advance, on a daily basis, in our training on...
Cyber Security Briefing
Telefónica Tech

Cyber Security Weekly Briefing 2-8 October

Apache vulnerabilities actively exploited Earlier this week, Apache fixed a 0-day (CVE-2021-41773) affecting Apache HTTP servers which was actively being exploited. However, on Thursday we learned that the patch released...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...

Navegación de entradas

Previous articles
1 … 22 23 24 … 27
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration