Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Madrid is IoT The Technological Revolution in The Medical Sector
  • Big Data
    • Can Big Data and IOT prevent motorcycle crashes? Big Data in basic research: from elementary particles to black holes
  • Cybersecurity
    • Open source maintainer burnout as an attack surface Cyber Security Weekly Briefing, 25 February – 3 March

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Global

Two men working with computer
New Markets Team

Human Factors in Cybersecurity: Protect Yourself

Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Menacing robot
Santiago Morante Cendrero

AI in Science Fiction Films: A Recurring Pattern of Fascination and Horror

In today’s post we are going to explore how Hollywood films have dealt with the subject of technological advances, especially robotics and Artificial Intelligence. You will be surprised to...
Billboards in the Theater District, New York City
Víctor Vallejo Carballo

AI of Things (V): Recommendation and optimisation of advertising content on smart displays

Learn about the benefits of technologies such as smart displays and Big Data for the outdoor advertising industry.
Man working with a computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 7–13 May

Vulnerability in BIG-IP exploited to erase data On May 4th, F5 fixed, among others, a vulnerability affecting BIG-IP devices (CVE-2022-1388 CVSSv3 9.8), which could allow an unauthenticated attacker with network...
Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo

Dark Markets in the internet age

What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Laptop, cup of coffee, notepad and mobile on a desk
Telefónica Tech

Cyber Security Weekly Briefing, 24 April – 6 May

TLStorm 2 – Vulnerabilities in Aruba and Avaya switches Researchers at Armis have discovered five vulnerabilities in the implementation of TLS communications in multiple models of Aruba and Avaya switches....
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
Computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing 22–29 April

New malicious RedLine distribution campaign Researchers at BitDefender have published a report on a new RedLine malware distribution campaign. According to the analysts, malicious actors are using the RIG Exploit...
A man using Chrome browser in a laptop
Sergio de los Santos

0days in numbers: Chrome, Windows, Exchange… What are attackers and manufacturers looking for?

Very interesting data from Google’s Project Zero, which tries to catalogue, find and disseminate 0days. They do not discover them directly, but “detect” them in any manufacturer when they...

Navegación de entradas

Volver a portada
1 2 3
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration