Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Activation Programme: Innovate with IoT What is a connected car and how can it improve the driving experience?
  • Big Data
    • Artificial Intelligence Fighting Fraud and False Declines Consumer Insights: Telling the stories behind the numbers
  • Cybersecurity
    • #LadyHacker: for yourself and for them Victory is on your ideas

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • #CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses
      Innovation and Laboratory Area in ElevenPaths

      #CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses

      Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
      Cybersecurity Trends Report for 2020 from ElevenPaths
      ElevenPaths

      Cybersecurity Trends Report for 2020 from ElevenPaths

      Discover the technologies and attacks that will most affect security in the coming months in this report.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      m33tfinder: a vulnerability on Cisco Meeting Server detected by ElevenPaths

      On November 7th, while we were holding our Security Innovation Day, Cisco published a security advisory with CVE-2018-15446 associated to a vulnerability on the software Cisco Meeting Server reported by our Innovation and Labs...
      Innovation and Laboratory Area in ElevenPaths

      EasyDoH Update Hot off the Press: New Improvements and Functionalities

      Just a few weeks ago, we launched EasyDoH: an extension for Firefox that simplifies the use of DNS over HTTPS. We have been asked about its improvements and several...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      #CyberSecurityPulse: Changing stereotypes in the security sector

      Ripples of outrage spread across the cybersecurity industry last week after women in red evening gowns were seen promoting a product at the Infosecurity Europe 2018 conference. The event’s...
      Challenges and Business Opportunities of Post Quantum Cryptography
      Gonzalo Álvarez Marañón

      Challenges and Business Opportunities of Post Quantum Cryptography

      Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

A government is known by the Apple data it requests
Sergio de los Santos

A government is known by the Apple data it requests

Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Your feelings influence your perception of risk and benefit more than you might think
ElevenPaths

Your feelings influence your perception of risk and benefit more than you might think

Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in...
Why you are late delivering all your projects and what you can do to address it
ElevenPaths

Why you are late delivering all your projects and what you can do to address it

Anyone who causes harm by forecasting should be treated as either a fool or a liar. Some forecasters cause more damage to society than criminals. —Nassim Taleb, The Black Swan, 2007 In 1957,...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths

How the “antimalware” XProtect for MacOS works and why it detects poorly and badly

Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)

In the first part of this article we explained how Bayesian inference works. According to Norman Fenton, author of Risk Assessment and Decision Analysis with Bayesian Networks: Bayes’ theorem is...
New research: Docless Vietnam APT. A very interesting malware against Vietnam Government
ElevenPaths

New research: Docless Vietnam APT. A very interesting malware against Vietnam Government

We have detected a malware sent to some email accounts belonging to a Vietnam government domain. This email is written in Vietnamese and is dated March 13th, 2019. It seems to...
How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)

Imagine that you come back home from San Francisco, just arrived from the RSA Conference. You are unpacking your suitcase, open the drawer where you store your underwear and…...
The base rate falacy
ElevenPaths

The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised

Before starting your workday, while your savoring your morning coffee, you open your favorite cybersecurity newsletter and an advertisement on a new Intrusion Detection System catches your attention: THIS IDS...
If you want to change your employees’ security habits, don’t call their will, modify their environment instead
ElevenPaths

If you want to change your employees’ security habits, don’t call their will, modify their environment instead

You’re in a coffee bar and you need to connect your smartphone to a Wi-Fi, so you check your screen and see the following options. Imagine that you know...
Don’t confuse the frequency of an incident with the ease you remember it
ElevenPaths

Don’t confuse the frequency of an incident with the ease you remember it

Imagine that there have been a few robberies in two parks of your town that have got all the attention for days. This afternoon you would like to go...

Navegación de entradas

Previous articles
1 … 22 23 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration