Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Farms 4.0: IoT to benefit agriculture Fleet Optimise for Rent-a-car Companies
  • Big Data
    • The evolution of TV – Addressable Advertising: Creating a Better, More Personal TV & Video Experience Success Story: Using Big Data to improve Tourism with Iberostar
  • Cybersecurity
    • Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (I) How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

digital identity

Photo: Arthur Mazi / Unsplash
María Teresa Nieto Galán

Digital Identity, Privacy and Blockchain —Can They All Be In The Same Equation?

We are becoming increasingly aware of how our data is circulating on the net. In fact, we have all probably had that feeling that, after looking at a pair...
Florence Broderick

Social engineering is more active than ever

The fact that Social Engineering has been the easiest method used by the scammers is not new. What we are going to describe in this blog today has been...
Florence Broderick

Introducing Mobile Connect – the new standard in digital authentication

The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration