Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Superpowers for everyone Make your holidays run smoothly with IoT
  • Big Data
    • Mum, when I grow up I want to be a hacker Responsible data usage for effective advertising
  • Cybersecurity
    • Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World Cyber Security Weekly Briefing 4 – 10 December

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Telefónica Tech

Cyber Security Weekly Briefing 18 – 24 December

Log4Shell Vulnerability (update) Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1...
Jorge González

How can we make water consumption more efficient?

Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient. Water...
AI, Eva
Santiago Morante Cendrero

Artificial Intelligence in fiction: Eva, by Kike Maíllo

Are you afraid your food processor will rebel and poison your lentils? Do you think your Roomba is watching you? Do you wear a hat when you see a...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Alexandre Maravilla

Onboarding and biometric authentication to fight online fraud

Online fraud has experienced a significant growth since the early 2020s pandemic accelerated the digital transformation of businesses and citizens. This is evidenced by the latest report from the...
Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
diversity technology field
Sandra Tello

The COVID crisis and diversity in the technology field

The pandemic has highlighted the need for STEM profiles The coronavirus pandemic is estimated to have accelerated digitalisation by 5 to 10 years. This means that the technology sector will...
Telefónica Tech

Cyber Security Weekly Briefing 4 – 10 December

Catalan government suffers DDoS attack According to the statement issued by the Catalan government, the Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) detected last Friday a cyber-attack that compromised more...
Roberto García Esteban

Cloud services enabling remote working

There is no doubt that the hybrid model in which face-to-face and remote work is shared is here to stay in companies all over the world, including SMEs. To...
Cyber Security Weekly Briefing 20-26 November
Telefónica Tech

Cyber Security Weekly Briefing 27 November – 3 December

Apple and Google fined 20 million for using user data The Italian Competition and Market Authority (AGCM) has fined both Google and Apple 10 million euros for their method of...

Navegación de entradas

Previous articles
1 … 27 28 29 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network
A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration