Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Barcelona, Singapore and Amsterdam: sustainable cities thanks to Internet of Things 5 AI uses in Photography
  • Big Data
    • Meet our LUCA team in Brazil A history of Lisp and its use in neural networks – Part I
  • Cybersecurity
    • #CyberSecurityPulse: The Attack Against the WPA2 Encryption that Poses a Threat to Our Wireless Security Your MacOS System Is Also A Target for Cybercrime – Protect It!

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Telefónica Tech

People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Edge Computing
Moncho Terol

How Connectivity Is Evolving Through Optical Fibre and Edge Computing

Every process involves efforts, trials and improvements in order to achieve overall success. The efforts that have been made in relation to connectivity are countless . Gone are the days...
edge-computing-smes
Roberto García Esteban

Cloud Computing Is the Lifeline for SMEs

Cloud Computing is an essential technology in companies’ business continuity plans, and this has been made very clear in the context of the Covid-19 pandemic. It is said that...
Social Media blog
Telefónica Tech

We’re talking about technology, will you join the conversation?

It is increasingly common to come across concepts such as Big Data, Artificial Intelligence, Internet of Things, Cyber Security, Cloud or Blockchain in any field and any conversation, disruptive...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
People and technology
Raúl Hernáinz Ortega

Technology and people living together through change

Today I would like to start this article by referring to one of the 8 steps that, according to John P. Kotter, a researcher in the field of digital...
Social Media Day
Marina Salmerón Uribes

What we should remind ourselves of on International Social Media Day

Today is the international day of social networks, tools that have changed our day-to-day personal and professional lives and from which we find it hard to detach ourselves. On...
Ransomware cyber security
Sergio de los Santos

What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon

In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
MWC
Bernardo Campillo

Telefónica Tech At MWC: Economic and Social Recovery Are Our Priorities

After a year of forced suspension due to health circumstances, in 2021 the world’s leading telecommunications and technology event will be held once again: the Mobile World Congress in...
Recap Advanced Factories
Telefónica Tech

Telefónica Tech was Present at Advanced Factories 2021 With Its Proposal For The Industrial Sector

On the 8th, 9th and 10th of June, the 5th edition of the Advanced Factories event was held in Barcelona, a major event in Spain on industrial automation, robotics...

Navegación de entradas

Previous articles
1 … 33 34 35 36
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration