Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Madrid is IoT Smart stores, the future of Retail
  • Big Data
    • Feel Free to browse: How online retailers are driving sales with sponsored data Business Messaging – From humble SMS to conversational commerce
  • Cybersecurity
    • Cyber Security Weekly Briefing 30 January – 5 February Cyber Security Weekly Briefing, 8 – 14 April
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

ElevenPaths Ambassadors

cyber security app iotm
Carlos Ávila

IoTM Mobile Applications and The Relevance Of Their Security

Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
Fireless Malware
Diego Samuel Espitia

Fileless Malware: A Growing but Controllable Attack

For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
No Pain, No Gain: Let's Hack 2021
ElevenPaths

No Pain, No Gain: Let´s Hack 2021

“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
Your MacOS System Is Also A Target for Cybercrime – Protect It!
Carlos Ávila

Your MacOS System Is Also A Target for Cybercrime – Protect It!

According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This...
How to Trick Apps That Use Deep Learning for Melanoma Detection
Franco Piergallini Guida

How to Trick Apps That Use Deep Learning for Melanoma Detection

One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
Digital Zombies and Social Engineering
Gabriel Bergel

Digital Zombies and Social Engineering

This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you credit it, and I loved it. We...
CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation's Intranet
Amador Aparicio

CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation’s Intranet

Parallels RAS (Remote Application Server) is a virtual desktop infrastructure (VDI) and application delivery solution that enables an organisation’s employees and clients to access and use applications, desktops and...
Detecting the Indicators of An Attack
Diego Samuel Espitia

Detecting the Indicators of An Attack

We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
Laboratory Information Management System (LIMS) and Its Mobile Applications
Carlos Ávila

Laboratory Information Management System (LIMS) and its Mobile Applications

For scientists and researchers, optimising time in a laboratory nowadays plays a key role in processing and delivering results. There are applications that have specialised capabilities for R&D laboratories,...
Homeworking: Balancing Corporate Control and Employee Privacy (II)
Antonio Gil Moyano

Homeworking: Balancing Corporate Control and Employee Privacy (II)

As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...

Navegación de entradas

Volver a portada
1 2 … 4
More articles
  • Telefónica Tech

Popular

Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
Miryam Artigas
Using Midjourney to create social media content
Any sentence containing the word ‘dinosaur’ is worthy of attention. Admit it, it happens to you too. And if not, I’ll tell you why we’re talking about dinosaurs in a...
Two men working with computer
New Markets Team
Human Factors in Cybersecurity: Protect Yourself
Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Image from No Man's Sky video game
Javier Coronado Blazquez
Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games
The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
cocacola
AI of Things
Coca-Cola’s use of AI to stay at the top of the drinks market
Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration