Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A digital twin to save the Mar Menor LPWA and 5G networks enable new IoT solutions
  • Big Data
    • The highlights of LUCA Innovation Day 2019. What did you miss? More countries focus on Artificial Intelligence
  • Cybersecurity
    • What Little Red Riding Hood teaches us about cyber security ClipBanker Malware Tries to Stop Our Defence Tool CryptoClipWatcher

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Mechanisms for Everyday Life
      ElevenPaths

      Cyber Security Mechanisms for Everyday Life

      It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents....
      APTualizator
      Innovation and Laboratory Area in ElevenPaths

      Uncovering APTualizator: the APT that patches Windows

      By the end of June 2019, we assisted to an incident were a high number of computers had started to reboot abnormally. In parallel, was detected a file called...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
      Sergio de los Santos

      A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

      In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
      Cybersecurity Weekly Briefing July 25-31
      ElevenPaths

      Cybersecurity Weekly Briefing July 25-31

      BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing April 3-9
      ElevenPaths

      Cyber Security Weekly Briefing April 3-9

      Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
      Two men working with computer
      New Markets Team

      Human Factors in Cybersecurity: Protect Yourself

      Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Florence Broderick

Cryptographic Security in IoT (III)

The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
Florence Broderick

New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool

Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick

ElevenPaths and Symantec plan a joint offer Security Solutions for IoT environments

ElevenPaths collaborates with Symantec as technology provider for its Security certificate service for IoT. Madrid, October 31 2016.- ElevenPaths, Telefónica Cyber Security Unit, announce our intends to collaborate with Symantec,...
Florence Broderick

Now you can use Latch with Dropbox, Facebook and others digital services

Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick

Cryptographic Security in IoT (II)

The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
Florence Broderick

ElevenPaths acquires Shadow technology from Gradiant

Chema Alonso (Chief Data Officer of Telefónica and Chairman of ElevenPaths) announced during Security Innovation Day 2016, the purchase of the Gradiant’s solution for document security, SHADOW. ...
Pablo Alarcón Padellano

“State-of-the-art” Partners to tackle the new NIS and GDPR legislation

With a continued rise in cybercrime, and considering our global economy is dependent on data driven decision-making, the EU has published new legislation that will have an impact on...
Florence Broderick

Latch Plugins Contest: Remember the story!

Last week ElevenPaths launched a new edition of the Latch Plugins Contest, where you can win up to 5,000 dollars. But remember, what we’re looking for is imagination, talent,...
Florence Broderick

New tool: PESTO, PE (files) Statistical Tool

One of the fundamental threats in security are vulnerabilities in general and, in particular, being able to exploit them to execute code. Historically, dozens of technologies have been developed...
Florence Broderick

Latch Plugins Contest: the plugins and hacks contest in which you can win up to 5,000 USD

REGISTER NOW! ElevenPaths is announcing a new edition of the LatchPlugins Contest, a challenge for daring doers passionate about technology. Would you like to win 5,000 dollars? Then let...

Navegación de entradas

Previous articles
1 … 35 36 37 … 48
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration