Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Activation: the IoT Program for Startups What is a connected car and how can it improve the driving experience?
  • Big Data
    • Mobility patterns in Lima and Callao based on Big Data technology Artificial Intelligence vs Cognitive Computing: What’s the difference?
  • Cybersecurity
    • Open source maintainer burnout as an attack surface Cybersecurity Weekly Briefing August 1-7

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Telefónica Tech

ElevenPaths

New Global DDoS Threat Report

Globally, Distributed Denial of Service (DDoS) attacks have become more prevalent, powerful and sophisticated. Attackers continue to see great success from using DDoS attacks as a major attack...
APTualizator
Innovation and Laboratory Area in ElevenPaths

Uncovering APTualizator: the APT that patches Windows

By the end of June 2019, we assisted to an incident were a high number of computers had started to reboot abnormally. In parallel, was detected a file called...
Luis Simón Gómez Semeleder

IoT is on your head

There are many Jobs in which protecting your head is vital to avoid serious accidents, but can you imagine being protected beyond the blows that a helmet prevents? And...
Beatriz Sanz Baños

Movistar Car: transform your vehicle into a connected car

The application of the Internet of Things in the devices of our environment has brought about an authentic revolution in our lives. Connectivity gives us an efficient digital life, both at work and...
AI of Things

Elena Gil, CEO of LUCA speaks to us about the potential of Big Data in business

“We are just beginning to see the opportunities that Big Data represents” The importance of data when making any decision is growing. Elena Gil, CEO at LUCA, Telefonica’s data unit,...

Navegación de entradas

Volver a portada
1 … 35 36
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration