Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • We’re talking about technology, will you join the conversation? Farms 4.0: IoT to benefit agriculture
  • Big Data
    • Success Story: pioneering project for economic and social development Are you Ready for a Wild World? Don’t miss out on Big Data for Social Good 2018!
  • Cybersecurity
    • Keys to Implementing a 360 Corporate Digital Identity The role of “Threat Hunting” as an enabler in ransomware incident response

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Cyber Securiry Report 2H 21
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
recap-blockchain
Telefónica Tech

Blockchain News: Everything You Need to Know About One of The Technologies of The Future

There is no doubt that Blockchain technology is one of the most popular technologies of recent times. In many blogs, forums, social networks and even in general media news,...
Moncho Terol

Edge Computing and Cyber Security: Benefits and Challenges

Digital transformation and economic growth are two key themes, closely related to the future of connectivity. One of the most important challenges that organisations of all types face in...
blog-cybersecurity-tech
Diego Samuel Espitia

New Threat, Old Techniques

For some years now, the techniques used by malware developers have focused on evading detection mechanisms, finding that obfuscated macros and the use of Windows proprietary tools are an...
cybercrime security
Víctor Mayoral-Vilches

Cybercrime in robotics, the Alias Robotics research that is travelling to Black Hat

Are industrial robots safe? This is the opening question of this analysis that Alias Robotics has worked on, together with TrendMicro, as part of an investigation into robotic security,...
Cyber Security Report 30 July
Telefónica Tech

Cyber Security Weekly Briefing 24-30 July

PetitPotam: new NTLM relay attack Security researcher Gilles Lionel, also known as Topotam, has discovered a flaw in Windows systems with enabled Active Directory Certificate Services (ADCS) that would allow...
Telefónica Tech

Cyber Security Weekly Briefing 17-23 July

​​​​Global cyber-espionage investigation published A joint consortium of organizations and media outlets has published an investigation revealing the indiscriminate marketing and use of Pegasus spyware. According to the investigators, a...
People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Edge Computing
Moncho Terol

How Connectivity Is Evolving Through Optical Fibre and Edge Computing

Every process involves efforts, trials and improvements in order to achieve overall success. The efforts that have been made in relation to connectivity are countless . Gone are the days...
Card Gift Fraud
Saad Bencrimo

Understanding Gift Card Fraud

Following an internal investigation, carried out by Digital Risk Protection’s team of analysts at Telefónica Tech, where a fraudulent URL impersonating a retail company led to the discovery of...

Navegación de entradas

Previous articles
1 … 33 34 35 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration