Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • FIWARE, the standard that IoT needs Telefónica Activation Programme: Innovate with IoT
  • Big Data
    • Success Story: Using Big Data to improve Tourism with Iberostar What are the 5 principles of joined-up data?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 15-21 October Cybersecurity in films: myth vs. reality with 10 examples

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Telefónica Tech

Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Cyber Security Report
Telefónica Tech

Cyber Security Weekly Briefing 11-17 September

S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
Tech GobalData
Bernardo Campillo

Telefónica Tech at the top of the IoT and Big Data podium

Today we want to revisit with you some good news that we received in mid-June, a little before the holiday season in July and August, a little before summer,...
PackageDNA
Diego Samuel Espitia

PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat

After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
tbe-mujereshacker-en-02
ElevenPaths

Victory is on your ideas

Victory is not always a question of numbers. In order to win, you have to believe in what you do, rely on your team and always be willing to...
Weekly Briefing 4-10 September
Telefónica Tech

Cyber Security Weekly Briefing 4-10 September

Critical vulnerability in Zoho ADSelfService Plus The company Zoho has issued a security advisory warning of a critical vulnerability in ADSelfService Plus, an enterprise password and login management software. The...
Dani Aldea
Telefónica Tech

‘Choosing people to whom you can entrust is one of the biggest challenges for entrepreneurs’, Dani Aldea – Altostratus

Altostratus is a specialised company in software development and digital transformation processes. Tell us about its beginnings, how did the idea come about? The idea came about in 2009, when...
Little Red Riding Hood
José Vicente Catalán

What Little Red Riding Hood teaches us about cyber security

They say that a good fairy tale will be considered as such if it has many different readings and is able to convey hundreds of different messages. Little Red...
Cyber Security Weekly Briefing 28 August-3 September
Telefónica Tech

Cyber Security Weekly Briefing 28 August – 3 September

PoC available and scans detected for RCE in Confluence On Wednesday 25 August, Confluence published a security advisory to warn of a vulnerability in Confluence Server and Data Center in versions prior...

Navegación de entradas

Previous articles
1 … 31 32 33 … 36
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration