Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC21: 5G and digital technologies, a reality for the post-covid recovery Artificial Intelligence 2022: myths and realities
  • Big Data
    • The rise of data-driven education LUCA and CARTO to work together bringing location to the next frontier of Big Data
  • Cybersecurity
    • Evolution of Spear-Phishing Techniques of Notorious Threat Groups and malware used Do I Really Need an Antivirus?

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

open badges
Gonzalo Álvarez Marañón

The Future of University Credentials Points Towards Blockchain And Open Badges

Do you want a university degree within 48 hours and without having to open a book, for less than €1,000? No problem. You don’t even need to go to...
Using DIARIO Through FOCA For Malware Analysis
Carlos Ávila

Using DIARIO Through FOCA For Malware Analysis

Web servers are one of the main channels for the spread of malware on the internet. They are frequently attacked in search of security flaws that allow them to...
malware
Gabriel Bergel

Mobile Malware, part of the Generation Z

Generation Z or “post Millenials” is the demographic group born between 1994 and 2010, mobile malware was born in 2004 with Cabir, the first virus to affect Symbian Series 60 phones....
ElevenPaths

Cyber Security Weekly Briefing May 8-14

Ransomware attack on a main US oil pipeline US energy company Colonial Pipeline was hit by a ransomware attack on Friday, causing the shutdown of around 8800km of pipelines supplying...
4 Tips for A Safe Return to the Workplace
ElevenPaths

4 Tips for a Safe Return to the Workplace

It has now been a year since many of us left our physical office behind to embrace remote working. Living rooms and bedrooms became our new offices and meeting rooms,...
Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography
Gonzalo Álvarez Marañón

Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography

Do you know what’ s the difference between quantum computing, quantum cryptography and post-quantum cryptography? Because to be honest, they have (almost) nothing to do with each other. They...
Tips to Download Apps Securely
ElevenPaths

Tips to Download Apps Securely

The arrival of smartphones brought about a paradigm shift in the way we use and consume content through mobile devices. So much so that, from that moment on, they...
Cyber Security Weekly Briefing May 1-7
ElevenPaths

Cyber Security Weekly Briefing May 1-7

Apple fixes four 0-day vulnerabilities in WebKit Apple released yesterday a security update to fix four 0-day vulnerabilities that could be actively exploited, according to Apple itself. These four flaws...
Cyber Security Weekly Briefing April 24-30 2021
ElevenPaths

Cyber Security Weekly Briefing April 24-30

BadAlloc – Critical Vulnerabilities in Industrial IoT and OT Devices Microsoft security researchers have discovered 25 critical remote code execution (RCE) vulnerabilities, collectively referred to as BadAlloc, affecting a wide...
Do I Really Need an Antivirus?
ElevenPaths

Do I Really Need an Antivirus?

How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.

Navegación de entradas

Previous articles
1 … 37 38 39 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Participating in GSMA Mobile 360 LATIN AMERICA
Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration