Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Madrid is IoT Using Smart Chatbots as an IoT interface
  • Big Data
    • 4 reasons why you should visit the LUCA stand at MWC2017 How to select AI and Big Data use cases?
  • Cybersecurity
    • Has the Office as We Know It Come to an End? A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

      This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence...
      Risk Analysis Applied to COVID-19
      Gabriel Bergel

      Risk Analysis Applied to COVID-19

      Our CSA Gabriel Bergel shows you how to apply the Risk Analysis methodology to the management of the COVID-19 threat.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      The Framing Effect: you make your choices depending on how information is presented

      You have received an alert from cyber intelligence. A terrible and enormous cyberattack is approaching. You must ensure the protection of 600 positions within your organization. You don’t have...
      ElevenPaths

      #CyberSecurityPulse: The Last Disaster of Ethereum’s Most Important Wallets

      It is estimated that 587 wallets with around 513,774.16 ethers have been frozen after an anomaly in one of Ethereum’s most important wallets was detected. Parity Technologies, a company...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Adversarial Attacks: The Enemy of Artificial Intelligence (II)
      Franco Piergallini Guida

      Adversarial Attacks: The Enemy of Artificial Intelligence (II)

      In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
      Two men working with computer
      New Markets Team

      Human Factors in Cybersecurity: Protect Yourself

      Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

20 Questions about Covid-19 Tracing Apps
Gonzalo Álvarez Marañón

20 Questions about Covid-19 Tracing Apps

Covid-19 tracking apps may raise many questions about citizens' privacy and security. We solve some of them in this article.
Zoom Seeks to Be More Secure and Purchases Keybase
Gonzalo Álvarez Marañón

Zoom Seeks to Be More Secure and Purchases Keybase

The most downloaded video call app during the quarantine responds to criticism for its serious security and privacy issues.
ElevenPaths has achieved Amazon Web Services (AWS) Security Competence status
ElevenPaths

ElevenPaths has achieved AWS Security Competency status

Telefónica Tech’s cybersecurity company has demonstrated deep technical and consulting expertise helping large enterprises to adopt, develop and deploy complex cloud security projects that protect their environments on AWS...
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
The Pharmaceutical Retail Industry and Their Mobile Applications
Carlos Ávila

The Pharmaceutical Retail Industry and Their Mobile Applications

Are users of pharmaceutical applications safe in terms of data security and privacy? Discover this analysis from our CSA Carlos Ávila.
Business Continuity Plan: From Paper to Action
Diego Samuel Espitia

Business Continuity Plan: From Paper to Action

How many Business Continuity Plans considered a global pandemic among the possible causes of business blockage?
Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
Rafael Ortiz

How to Make API REST Requests to Tor Hidden Services in an Android APK

If you are a developer and want to test your Android app with a Tor hidden service, here's how.
CapaciCard Is Already Working on iPhone
Innovation and Laboratory Area in ElevenPaths

CapaciCard Is Already Working on iPhone

Can you imagine authenticating yourself or authorizing a payment by simply swiping a card on your iPhone screen? CapaciCard makes it possible.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
TypoSquatting: Using Your Brain to Trick You
Diego Samuel Espitia

TypoSquatting: Using Your Brain to Trick You

Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.

Navegación de entradas

Previous articles
1 … 18 19 20 … 25
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration