Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Smart mining revolution Artificial Intelligence of Things, how things plan to make our lives simpler
  • Big Data
    • Could Artificial Intelligence be used to prevent suicide? How IoT and Big Data is elevating Energy Management
  • Cybersecurity
    • New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Cyber Security Report 1º April
Telefónica Tech

Cyber Security Weekly Briefing 26 March- 1 April

Spring4Shell vulnerability Spring has released security updates for the 0-day remote code execution (RCE) flaw known as Spring4Shell. Since the appearance of the vulnerability, unconfirmed information has been released from different...
Telefónica Tech

Affordable fleet management for Spanish SMEs

We live in a fast-changing environment. Spanish SMEs have sharpened their wits to stay in the business after the pandemic. Most of them have begun a process of digitalisation...
María Teresa Nieto Galán

Facts and lies about the famous concept of NFTs

The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
Telefónica Tech

Cyber Security Weekly Briefing 19-25 March

Privilege escalation vulnerability in Western Digital Independent security researcher Xavier Danest has reported a privilege escalation vulnerability in EdgeRover. It should be mentioned that EdgeRover is a software developed by storage products...
Mark Skelton

3 Key Cyber Security Considerations

To tackle cyber security effectively, we need to find new ways to meet the cyber challenges facing all of us. As CTO for Telefónica Tech UK&I, I regularly speak...
Sandra Tello

Towards a green digital transformation

COVID-19 has created challenges that were previously unimaginable, but it has also given us an incredible opportunity to reinvent and rebuild ourselves. In my last blog post we saw...
ElevenPaths

Cyber Security Weekly Briefing 12-18 March

Vishing by impersonating Microsoft The Office of Internet Security (OSI) has issued a security advisory to report an increase, in recent weeks, of fraudulent calls in which a supposed Microsoft...
Telefónica Tech's Innovation and Laboratory Area

#CyberSecurityReport2021H2: Log4Shell, the vulnerability that has exposed the software’s reliance on altruistically maintained libraries and their enormous security impact.

There are many reports on security trends and security summaries, but Telefónica Tech wants to make a difference. The Innovation and Lab team has just launched our own report...
Francisco Ibáñez González

AI of Things (II): Water, a sea of data

Water management companies have been adapting the way they manage their processes according to the evolution, costs and availability of technology in each part of their value chain. It...
Fly
Lucía López Sánchez

Are airlines companies as safe as they seem?

Recently, the number of news reporting cybersecurity incidents involving airlines companies worldwide has increased; cybercriminals are targeting airlines more and more often. Some examples of these incidents are the...

Navegación de entradas

Previous articles
1 … 23 24 25 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration