Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Kevin Ashton just asks companies to use the IoT An IoT that deserves an Oscar
  • Big Data
    • A data-driven football season Case Study: How Jacobs is using LUCA Transit to Improve Transport Planning in the UK
  • Cybersecurity
    • #LadyHacker: Proud of you all 26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Hacking

Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?
Vendetta Group and the COVID-19 Phishing Emails
Miguel Ángel de Castro

Vendetta Group and the COVID-19 Phishing Emails

A new threat has entered the COVID-19 scene: the Vendetta Group. How are their phishing campaigns different from others?
#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website

Find out all about #CyberSecurityPulse, our Telegram cybersecurity news channel.
The Security behind Apple's and Google's API for Tracing COVID-19 Infections
Gonzalo Álvarez Marañón

The Security behind Apple’s and Google’s API for Tracing COVID-19 Infections

How does Apple's and Google's technology developed for tracing Covid-19 infections work?
Developing a Tool to Decrypt VCryptor Ransomware
Innovation and Laboratory Area in ElevenPaths

Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org)

Discover how VCryptor ransomware works and the tool we have developed as part of NoMoreRansom.org to decrypt it.
Decepticons vs. Covid-19: The Ultimate Battle
Gabriel Bergel

Decepticons vs. Covid-19: The Ultimate Battle

Social engineering is being used more than ever by cybercriminals. What do Decepticons have to do with it?
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
Rafael Ortiz

How to Make API REST Requests to Tor Hidden Services in an Android APK

If you are a developer and want to test your Android app with a Tor hidden service, here's how.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.

Navegación de entradas

Previous articles
1 2 3 4 5
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Participating in GSMA Mobile 360 LATIN AMERICA
Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration