Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • How to know how smart a Smart City is GSMA IoT Security Champion: Award to our IoT Security team
  • Big Data
    • How to learn Python: the most important skill for employers The 7 priorities of a company when adopting Blockchain
  • Cybersecurity
    • 4 Tips to Secure Your Data The Confirmation Bias: we seek the information that confirms our decisions, refusing their opposed evidences
Think Big / Business
  • Big Data & AI
    • Olivia Brookhouse

      How to learn Python: the most important skill for employers

      The application of Artificial Intelligence to optimize Big Data and provide Data Insights is becoming a necessity to all business processes, therefore programmers are in hot demand. Designing effective...
      LUCA

      The 7 priorities of a company when adopting Blockchain

      Last week I shared with the 101Blockchainscommunity of professionals and digital innovators the Blockchain vision we have at Telefónica and how companies can create value by adopting this technology. If...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      How to know how smart a Smart City is

      Forbes illustrates the clear cut contrast bigger cities face. On one hand, cities are responsible for generating 80% of the world’s wealth but compared to other geographical spaces they...
      ElevenPaths

      GSMA IoT Security Champion: Award to our IoT Security team

      We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • 4 Tips to Secure Your Data
      ElevenPaths

      4 Tips to Secure Your Data

      We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
      ElevenPaths

      The Confirmation Bias: we seek the information that confirms our decisions, refusing their opposed evidences

      Imagine yourself in a lab over an experiment. You’re asked to analyze the following number sequence: 2, 4, 6 This sequence follows a rule. What do you think the rule is?...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Hacking Area

How to Trick Apps That Use Deep Learning for Melanoma Detection
Franco Piergallini Guida

How to Trick Apps That Use Deep Learning for Melanoma Detection

One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
Cyber Security Weekly Briefing February 13-19
ElevenPaths

Cyber Security Weekly Briefing February 13-19

​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data
Gonzalo Álvarez Marañón

Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data

— Here are the exact coordinates of each operative deployed in the combat zone.— How much?­— 100.000.— That is too much.— And a code that displays on screen the...
WhatsApp, Telegram or Signal, Which One?
ElevenPaths

WhatsApp, Telegram or Signal, Which One?

In the world of smartphones, 2021 began with a piece of news that has left no one indifferent: the update of WhatsApp’s terms and conditions of use. This measure,...
26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma
Sergio De Los Santos

26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma

From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not...
Triki: Cookie Collection and Analysis Tool
Juan Elosua Tomé

Triki: Cookie Collection and Analysis Tool

In July 2020, the Spanish Data Protection Agency, following the entry into force of the European General Data Protection Regulation and several consultations with the European Data Protection Committee...
CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)
Javier Provecho

CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)

On December 2nd, ElevenPaths’ CTO SRE team discovered an unauthenticated API within Harbor, a cloud native registry part of the CNCF. It is commonly used as an agnostic Docker...
Snitch Cryptography: How to Crack Tamper-Proof Devices
Gonzalo Álvarez Marañón

Snitch Cryptography: How to Crack Tamper-Proof Devices

Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation's Intranet
Amador Aparicio

CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation’s Intranet

Parallels RAS (Remote Application Server) is a virtual desktop infrastructure (VDI) and application delivery solution that enables an organisation’s employees and clients to access and use applications, desktops and...
Detecting the Indicators of An Attack
Diego Samuel Espitia

Detecting the Indicators of An Attack

We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...

Navegación de entradas

Volver a portada
1 2 … 22
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Detecting the Indicators of An Attack
Diego Samuel Espitia
Detecting the Indicators of An Attack
We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
4 Tips to Secure Your Data
ElevenPaths
4 Tips to Secure Your Data
We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
Innovation and Laboratory Area in ElevenPaths
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
There are many reports on security trends and summaries, but at ElevenPaths we want to make a difference. From the Innovation and Laboratory team, we have just launched our...
Laboratory Information Management System (LIMS) and Its Mobile Applications
Carlos Ávila
Laboratory Information Management System (LIMS) and its Mobile Applications
For scientists and researchers, optimising time in a laboratory nowadays plays a key role in processing and delivering results. There are applications that have specialised capabilities for R&D laboratories,...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility