Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Enjoy Connected Beer Click & Go, the multipurpose button
  • Big Data
    • How Germany moves Responsible data usage for effective advertising
  • Cybersecurity
    • CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques Understanding Digital Certificates

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Cyber Securiry Report 2H 21
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
recap-blockchain
Telefónica Tech

Blockchain News: Everything You Need to Know About One of The Technologies of The Future

There is no doubt that Blockchain technology is one of the most popular technologies of recent times. In many blogs, forums, social networks and even in general media news,...
Moncho Terol

Edge Computing and Cyber Security: Benefits and Challenges

Digital transformation and economic growth are two key themes, closely related to the future of connectivity. One of the most important challenges that organisations of all types face in...
blog-cybersecurity-tech
Diego Samuel Espitia

New Threat, Old Techniques

For some years now, the techniques used by malware developers have focused on evading detection mechanisms, finding that obfuscated macros and the use of Windows proprietary tools are an...
cybercrime security
Víctor Mayoral-Vilches

Cybercrime in robotics, the Alias Robotics research that is travelling to Black Hat

Are industrial robots safe? This is the opening question of this analysis that Alias Robotics has worked on, together with TrendMicro, as part of an investigation into robotic security,...
Cyber Security Report 30 July
Telefónica Tech

Cyber Security Weekly Briefing 24-30 July

PetitPotam: new NTLM relay attack Security researcher Gilles Lionel, also known as Topotam, has discovered a flaw in Windows systems with enabled Active Directory Certificate Services (ADCS) that would allow...
Telefónica Tech

Cyber Security Weekly Briefing 17-23 July

​​​​Global cyber-espionage investigation published A joint consortium of organizations and media outlets has published an investigation revealing the indiscriminate marketing and use of Pegasus spyware. According to the investigators, a...
People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Edge Computing
Moncho Terol

How Connectivity Is Evolving Through Optical Fibre and Edge Computing

Every process involves efforts, trials and improvements in order to achieve overall success. The efforts that have been made in relation to connectivity are countless . Gone are the days...
Card Gift Fraud
Saad Bencrimo

Understanding Gift Card Fraud

Following an internal investigation, carried out by Digital Risk Protection’s team of analysts at Telefónica Tech, where a fraudulent URL impersonating a retail company led to the discovery of...

Navegación de entradas

Previous articles
1 … 33 34 35 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration