Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Movistar Car: transform your vehicle into a connected car Smart Mobility, distances connected
  • Big Data
    • 5 Top Posts from LUCA Data Speaks Blog 2017 SMASSA Success Story: Intelligent Parking Services
  • Cybersecurity
    • Cyber Security Weekly Briefing, 11 – 18 November Fileless Malware: A Growing but Controllable Attack

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
      Gonzalo Álvarez Marañón

      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

      A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
      ElevenPaths expands its cloud security solutions portfolio with Prisma Cloud by Palo Alto Networks
      ElevenPaths

      ElevenPaths Expands Its Cloud Security Solutions Portfolio With Prisma Cloud By Palo Alto Networks

      ElevenPaths has achieved the status of Premier Public Cloud MSSP Partner with Palo Alto Networks. ElevenPaths, Telefónica Tech’s Cybersecurity Company, has expanded its Cloud Managed Security Service (Cloud MSS) by...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Weekly Briefing January 9-15
      ElevenPaths

      Cyber Security Weekly Briefing January 9-15

      Sunburst shows code matches with Russian-associated malware Researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a .NET...
      What Kind of Professionals Work in Our Security Operations Center (SOC)?
      ElevenPaths

      What Kind of Professionals Work in Our Security Operations Center (SOC)?

      Discover the different profiles of the SOC professionals in this post, who work day and night to provide the best security to our customers.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cybersecurity and Pandemic (I): People
      Gabriel Bergel

      Cybersecurity and Pandemic (I): People

      Cybersecurity is even more important in these times of pandemic and increasing cyberattacks, yes, but in addition to being a business focus at the corporate level, it must also...
      Homeworking: Balancing Corporate Control and Employee Privacy (II)
      Antonio Gil Moyano

      Homeworking: Balancing Corporate Control and Employee Privacy (II)

      As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

A government is known by the Apple data it requests
Sergio de los Santos

A government is known by the Apple data it requests

Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Your feelings influence your perception of risk and benefit more than you might think
ElevenPaths

Your feelings influence your perception of risk and benefit more than you might think

Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in...
Why you are late delivering all your projects and what you can do to address it
ElevenPaths

Why you are late delivering all your projects and what you can do to address it

Anyone who causes harm by forecasting should be treated as either a fool or a liar. Some forecasters cause more damage to society than criminals. —Nassim Taleb, The Black Swan, 2007 In 1957,...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths

How the “antimalware” XProtect for MacOS works and why it detects poorly and badly

Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)

In the first part of this article we explained how Bayesian inference works. According to Norman Fenton, author of Risk Assessment and Decision Analysis with Bayesian Networks: Bayes’ theorem is...
New research: Docless Vietnam APT. A very interesting malware against Vietnam Government
ElevenPaths

New research: Docless Vietnam APT. A very interesting malware against Vietnam Government

We have detected a malware sent to some email accounts belonging to a Vietnam government domain. This email is written in Vietnamese and is dated March 13th, 2019. It seems to...
How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)

Imagine that you come back home from San Francisco, just arrived from the RSA Conference. You are unpacking your suitcase, open the drawer where you store your underwear and…...
The base rate falacy
ElevenPaths

The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised

Before starting your workday, while your savoring your morning coffee, you open your favorite cybersecurity newsletter and an advertisement on a new Intrusion Detection System catches your attention: THIS IDS...
If you want to change your employees’ security habits, don’t call their will, modify their environment instead
ElevenPaths

If you want to change your employees’ security habits, don’t call their will, modify their environment instead

You’re in a coffee bar and you need to connect your smartphone to a Wi-Fi, so you check your screen and see the following options. Imagine that you know...
Don’t confuse the frequency of an incident with the ease you remember it
ElevenPaths

Don’t confuse the frequency of an incident with the ease you remember it

Imagine that there have been a few robberies in two parks of your town that have got all the attention for days. This afternoon you would like to go...

Navegación de entradas

Previous articles
1 … 22 23 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration