Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Future of the Construction Industry is Upon Us The era of a connected society
  • Big Data
    • We’re talking about technology, will you join the conversation? Towards a new Big Data ecosystem to mitigate Climate Change
  • Cybersecurity
    • How to Make API REST Requests to Tor Hidden Services in an Android APK Cyber Security Weekly Briefing, 5 – 9 June
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

ElevenPaths for companies

Cyber Security Weekly Briefing March 20-26
ElevenPaths

Cyber Security Weekly Briefing March 20-26

Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively against large enterprises and public...
Cyber Security Mechanisms for Everyday Life
ElevenPaths

Cyber Security Mechanisms for Everyday Life

It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents....
Everything You Need to Know About SSL/TSL Certificates
ElevenPaths

Everything You Need to Know About SSL/TLS Certificates

What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and a...
NextDefense: The ultimate cyber defence solution for any organisation
Nikolaos Tsouroulas

NextDefense: The ultimate cyber defence solution for any organisation

It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving....
Your MacOS System Is Also A Target for Cybercrime – Protect It!
Carlos Ávila

Your MacOS System Is Also A Target for Cybercrime – Protect It!

According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This...
Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
Gonzalo Álvarez Marañón

Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)
Martiniano Mallavibarrena

The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)

In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of...
Cyber Security Weekly Briefing February 6-12
ElevenPaths

Cyber Security Weekly Briefing 27 February – 5 March

HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
How to Trick Apps That Use Deep Learning for Melanoma Detection
Franco Piergallini Guida

How to Trick Apps That Use Deep Learning for Melanoma Detection

One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
Cyber Security Weekly Briefing February 13-19
ElevenPaths

Cyber Security Weekly Briefing February 13-19

​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...

Navegación de entradas

Previous articles
1 … 3 4 5 … 20
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration