Paloma Recuero de los Santos IoT and Big Data: What’s the link? The digital revolution has changed our lives. To begin with, technological advances were linked to the worlds of scientific research, industrial innovation, the space race, defence, health, private companies...
Telefónica Tech Cyber Security Weekly Briefing 15–21 january Cyber-attack campaign against Ukrainian targets The Microsoft Threat Intelligence Center team has been analysing the succession of cyberattacks against Ukrainian organisations since 13 January, which have affected at least 15 government institutions...
Santiago Morante Cendrero Deep Learning in Star Wars: May Computation Be With You Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Telefónica Tech Cyber Security Weekly Briefing 8–14 january Microsoft security bulletin Microsoft has published its January security bulletin in which it has fixed a total of 97 bugs, including six 0-day vulnerabilities and nine bugs classified as critical....
Susana Alwasity The risks of not having controlled exposure to information (I) Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
Carlos Martínez Miguel Artificial Intelligence 2022: myths and realities We are only in the early stages of AI development, but its impact is already huge When making predictions in the technological field, it is always advisable to start by...
Antonio Ramírez The digitisation of predictive technology: digital twins I still remember talking to my colleague Miguel Mateo after his presentation at the Telefónica Tech stand at MWC21 (Mobile World Congress 2021) about how the union of Predictive...
Telefónica Tech Cyber Security Weekly Briefing 1–7 january Mail delivery failure on Microsoft Exchange on-premises servers 2 January, Microsoft released a workaround to fix a bug that interrupted email delivery on Microsoft Exchange on-premises servers. The bug is a “year...
Telefónica Tech Cyber Security Weekly Briefing 28-31 december Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...
Telefónica Tech Most read content in 2021 The end of the year is approaching and from the Telefónica Tech blog we wanted to make a compilation of the contents that have most engaged our audience, technology...
Florence Broderick Participating in GSMA Mobile 360 LATIN AMERICA Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick New tool: Maltego transforms for Tacyt If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...