Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT is increasingly getting safer IoT for Beginners (The Internet of latecomers)
  • Big Data
    • What role will Data Governance play in the Digital Transformation after COVID-19? An introduction to Machine Learning: “What are Insights?”
  • Cybersecurity
    • Cyber Security Weekly Briefing, 18 – 24 February Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Top 4 Programming Languages for Beginners
      ElevenPaths

      Top 4 Programming Languages for Beginners

      Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
      ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
      ElevenPaths

      ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

      In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      Evrial, malware that steals Bitcoins using the clipboard… and the scammed scammers

      Evrial is the latest cryptocoin malware stealer, and uses the power to control the clipboard as its strongest bet to get “easy money”. Elevenpaths has took a deep technical...
      Telefónica Tech

      Cyber Security Weekly Briefing 4 – 10 December

      Catalan government suffers DDoS attack According to the statement issued by the Catalan government, the Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) detected last Friday a cyber-attack that compromised more...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Top 10 TED Talks to Learn about Cybersecurity
      Gonzalo Álvarez Marañón

      Top 10 TED Talks to Learn about Cyber Security

      Discover the top 10 talks to learn about cybersecurity and, at the same time, some ways to improve your own presentations.
      Cyber Security Weekly Briefing May 1-7
      ElevenPaths

      Cyber Security Weekly Briefing May 1-7

      Apple fixes four 0-day vulnerabilities in WebKit Apple released yesterday a security update to fix four 0-day vulnerabilities that could be actively exploited, according to Apple itself. These four flaws...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Florence Broderick

Telefónica and ElevenPaths present new Path6 solution, alliances and investments

Third anniversary of leadership in innovation and cybersecurity TELEFÓNICA AND ELEVENPATHS PRESENT THE PATH6 SOLUTION, THEIR NEW ALLIANCES AND INVESTMENTS IN THE IV SECURITY INNOVATION DAY New alliances with prominent...
Florence Broderick

Participating in GSMA Mobile 360 LATIN AMERICA

Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick

Connect via streaming Security Innovation Day, the event of the year in cybersecurity

SIGN UP TO THE live stream! Welcome to the fourth edition of our Security Innovation Day which will be celebrated on October 6 at 3:00 pm (Madrid time) at the Telefónica...
Florence Broderick

SAVE THE DATE: Security Innovation Day 2016

SIGN UP NOW! Security Innovation Day is the setting where every year Telefónica and ElevenPaths unveil their latest launches and novelties in innovation and security. The event has become...
ElevenPaths

Cybersecurity Shot_MUPOL Information Leakage

Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick

Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization

Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick

New Tool: PinPatrol add-on for Firefox

We have created a new tool for improving the experience using HSTS and HPKP in Firefox. This tool is a Firefox add-on that shows this information in a human...
Florence Broderick

New tool: Maltego transforms for Tacyt

If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick

European Cybersecurity Strategy: Telefónica´s support

Telefónica welcomes two relevant milestones that have taken place in Brussels during the last days in order to foster the European cybersecurity strategy to avoid incidents that can undermine...
Florence Broderick

Another month, another new rooting malware family for Android

Several months ago there was a media explosion about Android-rooting malware on Google Play. Those families were discovered by Cheetah Mobile Security Research Lab, Check Point, Lookout, FireEye,...

Navegación de entradas

Previous articles
1 … 36 37 38 … 48
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration