Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 amazing things at CES 2018 We apply quantum technology to real use cases of Blockchain and IoT
  • Big Data
    • Where are people from Madrid going during the upcoming December holidays? Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)
  • Cybersecurity
    • Cyber Security Weekly Briefing, 1 — 8 July We are now live! Discover the new Telefónica Tech website

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Olivia Brookhouse

The Big Data hiding behind Halloween

Big Data and Artificial Intelligence are shaping the future of business with data insights, personalised content and improved user experiences and Halloween, one of the biggest consumer holidays, is...
Innovation and Laboratory Area in ElevenPaths

EasyDoH Update Hot off the Press: New Improvements and Functionalities

Just a few weeks ago, we launched EasyDoH: an extension for Firefox that simplifies the use of DNS over HTTPS. We have been asked about its improvements and several...
Beatriz Sanz Baños

The heart of the airports pumps with IoT

The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
AI of Things

The highlights of LUCA Innovation Day 2019. What did you miss?

The third edition of LUCA Innovation Day took place on Wednesday the 16th of October, in which we presented the advances developed over the last year by the data...
Innovation and Laboratory Area in ElevenPaths

Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%

Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
Óscar Mancebo

Movistar Living Apps, a new technological experience in the home

The fact that Artificial Intelligence is revolutionising and transforming the telecommunications sector is nothing new. Users, accustomed to dealing with virtual assistants and chatbots, increasingly rely on digital transformation. Anticipating...
Olivia Brookhouse

Artificial Intelligence, doing more than humanly possible since the Greeks

Many of those working in the world of Artificial Intelligence acknowledge the 1950’s as the birth of concepts such as Machine Intelligence and Artificial Intelligence with the creation of...
Beatriz Sanz Baños

IoT and everything under control

With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Richard Benjamins

Artificial Intelligence in small and medium-sized enterprises

We hear of increasingly more applications of Artificial Intelligence ranging from improved medical diagnosis to autonomous vehicles to automatic translation to voice recognition. But when we look at the...
AI of Things

Success Story: pioneering project for economic and social development

In a previous article we talked about how important it is to undertake a cultural transformation, that is, of individuals, whilst a company or sector undertakes a digital transformation...

Navegación de entradas

Previous articles
1 … 67 68 69 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network
A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration