Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Say goodbye to traffic jams IoT for a better world
  • Big Data
    • 5 uses of data on Black Friday LUCA’s first 70 days
  • Cybersecurity
    • Vendetta Group and the COVID-19 Phishing Emails ElevenPaths participates in AMBER (“enhAnced Mobile BiomEtRics”) project

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Cristina de la Cruz

How do we talk to Aura in different countries?

The implementation of Aura, Telefónica’s Artificial Intelligence, in Spain, Brazil, the United Kingdom and Germany has revolutionised the way customers interact with the company. Currently, and depending on the...
Cybersecurity Weekly Briefing July 25-31
ElevenPaths

Cybersecurity Weekly Briefing July 25-31

BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
Olivia Brookhouse

Artificial Intelligence: a companion to fight loneliness

Today is International friendship day, a day where we can celebrate all those individuals around us that bring us joy daily. Whilst we might imagine the youth population to...
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer

Understand the risks of the current cybersecurity scene with this biannual report by our Innovation and Laboratory Area.
Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
Sergio de los Santos

Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
Innovation and Laboratory Area in ElevenPaths

4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
University and Industry: Talent Is Out There (III)
Innovation and Laboratory Area in ElevenPaths

University and Industry: Talent Is Out There (III)

Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
Security and Privacy on the "Internet of Health”
Carlos Ávila

Security and Privacy on the “Internet of Health”

Health comes first, but first we must ensure that our medical data have the appropriate security mechanisms to be reliable.
Challenges and Business Opportunities of Post Quantum Cryptography
Gonzalo Álvarez Marañón

Challenges and Business Opportunities of Post Quantum Cryptography

Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
Cybersecurity Weekly Briefing July 11-17
ElevenPaths

Cybersecurity Weekly Briefing July 11-17

Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with...

Navegación de entradas

Previous articles
1 … 54 55 56 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration