Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Farms 4.0: IoT to benefit agriculture Big Data and Artificial Intelligence solutions for the tourism industry
  • Big Data
    • Ending cyberbullying using artificial intelligence and machine learning MWC Day 2: Our partnership with UNICEF to boost Big Data for Social Good
  • Cybersecurity
    • The truth behind Libra, Facebook’s new cryptocurrency Cyber Security Weekly Briefing 25 September – 1 October

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Cybersecurity Weekly Briefing 26 September - 2 October
ElevenPaths

Cybersecurity Weekly Briefing 26 September – 2 October

The logistics giant CMA CGM affected by a cyber attack This week, the French logistics group CMA CGM, which operates in 160 different countries, reported via its website and social...
ChainLock, A Linux Tool for Locking Down Important Files
Innovation and Laboratory Area in ElevenPaths

ChainLock, A Linux Tool for Locking Down Important Files

Let’s say you have a valuable file on your computer, such as a bitcoin wallet file (“wallet.dat”), or some other file with sensitive information, and you decide put a...
DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
Innovation and Laboratory Area in ElevenPaths

DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
Paloma, Recuero de los Santos

Internet of Things… Archaeological Sites

At the end of 2019, according to IoT Analytics, there were already 9.5 billion connected devices for consumers, businesses and scientists. The forecast for 2025 is three times this...
Has the Office as We Know It Come to an End?
Miguel Ángel Martos

Has the Office as We Know It Come to an End?

2020 has had a difficult start. We have learned that what was “usual” may not be the best. We should reconsider this idea of “the office” as the centre...
Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
ElevenPaths

Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
New TheTHE Version with URLScan and MalwareBazaar Plugins
Innovation and Laboratory Area in ElevenPaths

New TheTHE Version with URLScan and MalwareBazaar Plugins

The first time an IoC lay on your hands. Let’s say it is a hash, URL, IP or a suspicious domain. You need to know some basic information. Is...
Adversarial Attacks: The Enemy of Artificial Intelligence (II)
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence (II)

In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
Cybersecurity Weekly Briefing September 19-25
ElevenPaths

Cybersecurity Weekly Briefing September 19-25

New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralized World
Gonzalo Álvarez Marañón

Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

In the Renaissance Italy, duels between mathematicians were common, but not by crossing steels, but by solving difficult problems. One of the hardest bones to crack at the time...

Navegación de entradas

Previous articles
1 … 50 51 52 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration