Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • Distribution and Logistics Companies The future of Internet of Things
  • Big Data
    • 5 uses of data on Black Friday Ending cyberbullying using artificial intelligence and machine learning
  • Cybersecurity
    • #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address? #CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business
Think Big / Business
  • Big Data & AI
    • LUCA

      5 uses of data on Black Friday

      There are many stories that suggest how the term ‘Black Friday’ came into use. One common misconception often shared is that Black Friday gets its name from the first...
      LUCA

      Ending cyberbullying using artificial intelligence and machine learning

      Cyberbullying, defined as “the use of electronic communication to bully a person” by Oxford Dictionaries, is a worrying problem in our increasingly connected society. Nowadays, it is perhaps most...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      Distribution and Logistics Companies

      IoT technology services are already applied in the distribution and logistics industry to optimize different processes. This has a positive effect on the productivity, security and the preventive maintenance...
      Beatriz Sanz Baños

      The future of Internet of Things

      Looking at just how much the internet has changed our lives, it’s incredible to imagine how some people didn’t took it seriously at the beginning. One of the reasons...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

      As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
      ElevenPaths

      #CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business

      The new year has started with a story that has taken the covers of specialized and generalist media all around the world. The vulnerabilities named as Meltdown and Spectre...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

ElevenPaths for companies

ElevenPaths

#CyberSecurityPulse: PyeongChang Olympics: A New False Flag Attack?

A postmortem of the Olympic Destroyer malware used in the PyeongChang Olympics attack reveals a deliberate attempt by adversaries to plant a false flags when it comes to attribution,...
ElevenPaths

#CyberSecurityPulse: Dude, Where Are My Bitcoins?

Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
ElevenPaths

#CyberSecurityPulse: Oops, I Went Running and I Published Information From Secret Locations

The popular fitness tracking app Strava proudly published a 2017 heat map showing activities from its users around the world, but unfortunately, the map revealed locations of the United...
Pablo Alarcón Padellano

Managed Detection & Response: Prevention is Not Enough, You Need to Become Cyber-Resilient

You want your organization to be cyber-resilient but you have no means? You have advanced security solutions in place, but you lack skilled staff trained to take advantage of them? You...
ElevenPaths

Tackling Cybercrime: Three Recommendations for 2018

In 2017 we saw ransomware variants such as Wannacry wreak havoc across computer networks in the UK. Not only were these variants of malware almost impossible to remove from...
ElevenPaths

#CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
ElevenPaths

#CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business

The new year has started with a story that has taken the covers of specialized and generalist media all around the world. The vulnerabilities named as Meltdown and Spectre...
ElevenPaths

Come to Create Technology at Telefónica’s Chief Data Office Unit

Hi Hacker! Technology is in a constant evolution and so are we. Therefore, from Telefónica, throughout the Chief Data Office (CDO) led by Chema Alonso, which includes Aura -Cognitive Intelligence-, ElevenPaths -Cybersecurity-, LUCA -Big Data-...
ElevenPaths

SealSign integration with the Azure Key Vault

ElevenPaths and Microsoft, thanks to Gradiant technology, have integrated the Azure Key Vault into the SealSign platform. This partnership provides a server-based digital signature and certificate safekeeping service, based...
ElevenPaths

Security and electronic signature for any enterprise

ElevenPaths, Microsoft and Gradiant have collaborated to allow companies to benefit from an advanced platform for electronic signatures and digital certificate safekeeping, integrated with a cloud service for HSM...

Navegación de entradas

Previous articles
1 … 13 14 15
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Patrick Buckley
How IoT technology is helping candy producers make sweet profits!
From chocolate bars to lollipops, gumdrops to Haribos, the confectionary industry is now worth an estimated 210$ billion worldwide. With the industry experiencing strong growth, it is no surprise...
Curiosities About Windows XP Code Leak
ElevenPaths
Curiosities About Windows XP Code Leak
A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths
How the “antimalware” XProtect for MacOS works and why it detects poorly and badly
Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility