Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • eSIM cards are here to boost the IoT Smart Agriculture: from the plow to the drone
  • Big Data
    • How AI and Machine Learning help to develop vaccines CTGBCN: Solutions from the Catalan Capital
  • Cybersecurity
    • Apple introduces up to 14 signatures in XProtect given the malware flood for Mac Detected an extension in Chrome Web Store, active from February, that steals credit cards

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Global

Report cyber
Telefónica Tech

Cyber Security Weekly Briefing 12-18 February

Researchers develop exploit for critical vulnerability in Magento Positive Technologies’ offensive security team has developed a Proof of Concept (PoC) for the CVE-2022-24086 CVSSv3 9.8 vulnerability, claiming that it would allow control...
Telefónica Tech

Cyber Security Weekly Briefing 29 January – 4 February

Exploits that allow privilege elevation in Windows published Security researchers have made public several exploits that leverage a known elevation of privilege vulnerability that affects all versions of Windows 10. The exploits...
Paloma Recuero de los Santos

IoT and Big Data: What’s the link?

The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
most readed contents 2021
Telefónica Tech

Most read content in 2021

The end of the year is approaching and from the Telefónica Tech blog we wanted to make a compilation of the contents that have most engaged our audience, technology...
Moncho Terol

Edge Computing and Cyber Security: Benefits and Challenges

Digital transformation and economic growth are two key themes, closely related to the future of connectivity. One of the most important challenges that organisations of all types face in...
Social Media blog
Telefónica Tech

We’re talking about technology, will you join the conversation?

It is increasingly common to come across concepts such as Big Data, Artificial Intelligence, Internet of Things, Cyber Security, Cloud or Blockchain in any field and any conversation, disruptive...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
People and technology
Raúl Hernáinz Ortega

Technology and people living together through change

Today I would like to start this article by referring to one of the 8 steps that, according to John P. Kotter, a researcher in the field of digital...
Ransomware cyber security
Sergio de los Santos

What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon

In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
MWC
Bernardo Campillo

Telefónica Tech At MWC: Economic and Social Recovery Are Our Priorities

After a year of forced suspension due to health circumstances, in 2021 the world’s leading telecommunications and technology event will be held once again: the Mobile World Congress in...

Navegación de entradas

Previous articles
1 2 3 4
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration