Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The future of Internet of Things Have you ever wondered where the energy comes from?
  • Big Data
    • Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project How to select AI and Big Data use cases?
  • Cybersecurity
    • Meet #LadyHacker Jess Woods, Cloud expert at Telefónica Tech Cyber Security Weekly Briefing, 28 October – 4 November

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Olivia Brookhouse

The Big Data and IoT applications fighting coronavirus

The coronavirus pandemic has truly turned our lives upside down, changing how we work, study and interact in every way. The global health crisis has tested every government’s ability...
#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website

Find out all about #CyberSecurityPulse, our Telegram cybersecurity news channel.
The Security behind Apple's and Google's API for Tracing COVID-19 Infections
Gonzalo Álvarez Marañón

The Security behind Apple’s and Google’s API for Tracing COVID-19 Infections

How does Apple's and Google's technology developed for tracing Covid-19 infections work?
Winner of the #EquinoxRoom111 Contest
Innovation and Laboratory Area in ElevenPaths

Winner of the #EquinoxRoom111 Contest

We already have a winner of TheTHE's plugin contest. Discover our collaborative tool for Threat Hunting teams.
Developing a Tool to Decrypt VCryptor Ransomware
Innovation and Laboratory Area in ElevenPaths

Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org)

Discover how VCryptor ransomware works and the tool we have developed as part of NoMoreRansom.org to decrypt it.
Cascajo Sastre María

5 ways the IoT is helping the Environment

The United Nations uses World Environment Day every year to create awareness regarding pressing environmental issues. This year the topic is “Time for Nature“. We will see how even...
Olivia Brookhouse

Telefónica Activation Programme: Innovate with IoT

Creating and inventing technological products and solutions. Anticipating the needs of the future and helping the transition to the digital era. Do you know who we are talking about?...
Cybersecurity Weekly Briefing 23-29 May
ElevenPaths

Cybersecurity Weekly Briefing 23-29 May

Critical-Severity RCE Vulnerability in Cisco Unified CCX Cisco has fixed a critical remote code execution bug in the Java Remote Management Interface of Cisco Unified Contact Center Express (CCX). This...
Decepticons vs. Covid-19: The Ultimate Battle
Gabriel Bergel

Decepticons vs. Covid-19: The Ultimate Battle

Social engineering is being used more than ever by cybercriminals. What do Decepticons have to do with it?
Olivia Brookhouse

Telefónica Activation Programme, how to scale your startup

Today we bring you a post aimed at all you entrepreneurs. According to a study conducted by Wayra, 74% of startups are seeing their business affected by the damage...

Navegación de entradas

Previous articles
1 … 58 59 60 … 123
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration