Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Women’s Engineering Day: Building New Paths How can we bring Internet of Things to the rural world?
  • Big Data
    • The best Data Science certifications AI of Things (V): Recommendation and optimisation of advertising content on smart displays
  • Cybersecurity
    • Cyber Security Weekly Briefing, 15-21 October AMSI, one step further from Windows malware detection

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

AI of Things

Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs

Normal 0 false false false EN-US ZH-CN AR-SA /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; ...
AI of Things

Entrevista: Angela Shen-Hsieh desmitifica“la caja negra” del Big Data

Angela Shen-Hsieh es Directora de Predicción del Comportamiento Humano en la Innovación de Productos de Telefónica. En esta función, se encarga de liderar la innovación interna. Antes de unirse a...
AI of Things

The new Spain: redrawing the country using mobility data

One of the most exciting fields that the use of data opens up is the study of networks. Our societies, communications, infrastructure, businesses and many other areas of life...
Figure 1: The Royal Palace is one of Madrid's top tourist attractions.
AI of Things

Case Study: LUCA Tourism and Royal Palace Visitors Analysis

Madrid receives almost 6 million international tourists annually, who come to the city to see the history, soak up the sunshine and experience the culture. In addition to this...
ElevenPaths

The Intelligent MSSP

During years, Managed Security Services (MSS) have been the most effective strategy to tackle the increasing and changing threat landscape. Otherwise, some disruptive factors are compelling a new approach...
Figure 1: DK Management have decided to use LUCA Store.
AI of Things

Case Study: LUCA Store and DK Management, driving footfall and increasing convertion

In case you didn’t already know one of the many products from our business portfolio is LUCA Store. This post will take a look at our collaboration with DK...
ElevenPaths

ElevenPaths and BitSight deliver enhanced visibility into supply chain risk with continuous monitoring

Security Ratings Market Leader Expands Global Reach with New Strategic Alliance CAMBRIDGE, MA—June 13, 2017. ElevenPaths, Telefónica Cibersecurity Unit specialized in the development of innovative security solution, and BitSight, the Standard...
AI of Things

What does it take to become a top class Smart City?

The term Smart City is a term that has been coined in recent years following the surge in use of Big Data. At LUCA we have been contributing to...
AI of Things

Data rewards are the new consumer engagement tool & Gigabytes are the new currency

Today’s consumers are fairly savvy about companies selling to them. As they are constantly bombarded with an increasing number of calls to action, these engagement attempts are often viewed...
AI of Things

Machine Learning to analyze League of Legends

Written by David Heras and Paula Montero, LUCA Interns, and Javier Carro Data Scientist at LUCA When League of Legends was released in 2009, few people could have predicted what...

Navegación de entradas

Previous articles
1 … 107 108 109 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network
A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration