Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things(I): Multiplying the value of connected things Artificial Intelligence of Things, how things plan to make our lives simpler
  • Big Data
    • Where are people from Madrid going during the upcoming December holidays? Rebuilding Mocoa with Big Data
  • Cybersecurity
    • Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS How to Make API REST Requests to Tor Hidden Services in an Android APK

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • 4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
      Innovation and Laboratory Area in ElevenPaths

      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

      Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
      Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way
      Cytomic Team, unit of Panda Security

      Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way

      Quick and agile response to incidents is a basic aspect of a good cybersecurity strategy. Little by little, more and more companies are becoming aware of this, and this...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      You’ve got mail? You’ve got malware

      A few weeks ago I was ‘compromised’. A well-known vulnerability was exploited and I was left financially exposed, with my reputation potentially at risk. “What happened?” I hear you...
      ElevenPaths

      New tool: “Web browsers HSTS entries eraser”, our Metasploit post exploitation module

      This module deletes the HSTS/HPKP database of the main browsers: Chrome, Firefox, Opera, Safari and wget in Windows, Mac and Linux. This allows an attacker to perform man in...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • 4 Tips to Secure Your Data
      ElevenPaths

      4 Tips to Secure Your Data

      We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
      Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
      Gonzalo Álvarez Marañón

      Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

      You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

20 Questions about Covid-19 Tracing Apps
Gonzalo Álvarez Marañón

20 Questions about Covid-19 Tracing Apps

Covid-19 tracking apps may raise many questions about citizens' privacy and security. We solve some of them in this article.
Zoom Seeks to Be More Secure and Purchases Keybase
Gonzalo Álvarez Marañón

Zoom Seeks to Be More Secure and Purchases Keybase

The most downloaded video call app during the quarantine responds to criticism for its serious security and privacy issues.
ElevenPaths has achieved Amazon Web Services (AWS) Security Competence status
ElevenPaths

ElevenPaths has achieved AWS Security Competency status

Telefónica Tech’s cybersecurity company has demonstrated deep technical and consulting expertise helping large enterprises to adopt, develop and deploy complex cloud security projects that protect their environments on AWS...
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
The Pharmaceutical Retail Industry and Their Mobile Applications
Carlos Ávila

The Pharmaceutical Retail Industry and Their Mobile Applications

Are users of pharmaceutical applications safe in terms of data security and privacy? Discover this analysis from our CSA Carlos Ávila.
Business Continuity Plan: From Paper to Action
Diego Samuel Espitia

Business Continuity Plan: From Paper to Action

How many Business Continuity Plans considered a global pandemic among the possible causes of business blockage?
Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
Rafael Ortiz

How to Make API REST Requests to Tor Hidden Services in an Android APK

If you are a developer and want to test your Android app with a Tor hidden service, here's how.
CapaciCard Is Already Working on iPhone
Innovation and Laboratory Area in ElevenPaths

CapaciCard Is Already Working on iPhone

Can you imagine authenticating yourself or authorizing a payment by simply swiping a card on your iPhone screen? CapaciCard makes it possible.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
TypoSquatting: Using Your Brain to Trick You
Diego Samuel Espitia

TypoSquatting: Using Your Brain to Trick You

Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.

Navegación de entradas

Previous articles
1 … 18 19 20 … 25
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration