Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Have you ever wondered where the energy comes from? Ethical IoT: principles for an implementation that respects people’s rights
  • Big Data
    • Chatbots? New? You haven’t met ELIZA What does Big Data tell us about the way people move around Brazil’s favelas?
  • Cybersecurity
    • The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography If you want to change your employees’ security habits, don’t call their will, modify their environment instead

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths Radio English #5 - The Path After a Security Audit
      ElevenPaths

      ElevenPaths Radio English #5 – The Path After a Security Audit

      What is the path for a company after a security audit? It is increasingly common for companies of all sizes to decide to carry out such analyses, but what...
      Move to the cloud with confidence supported by ElevenPaths and Check Point
      Pablo Alarcón Padellano

      Move to the cloud with confidence supported by ElevenPaths and Check Point

      The goal of ElevenPaths Public Cloud Managed Security Services is to help you to secure any cloud workload and to mitigate cloud risks.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • The First Official Vulnerabilities in Machine Learning in General
      Franco Piergallini Guida

      The First Official Vulnerabilities in Machine Learning in General

      Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
      Analysis of APPs Related to COVID19 Using Tacyt (I)
      Andrés Naranjo

      Analysis of APPs Related to COVID19 Using Tacyt (I)

      Taking advantage of all the attention this issue is attracting, the official app markets, Google Play and Apple Store, have been daily deluged with applications. Both platforms, especially Android,...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Sergio de los Santos

      Facebook signed one of its apps with a private key shared with other Google Play apps since 2015

      Facebook Basics is a Facebook app aimed at countries with poor connectivity, where a free access service to WhatsApp and Facebook is provided. It has been discovered that the Android version...
      Photo: Christina Wocintechchat.com
      Telefónica Tech

      Cyber Security Weekly Briefing, 1 — 8 July

      Raspberry Robin: worm detected in multiple Windows networks Microsoft has issued a private advisory to Microsoft Defender for Endpoint subscribers, informing about the detection of the Raspberry Robin malware in...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Do I Really Need an Antivirus?
ElevenPaths

Do I Really Need an Antivirus?

How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.
NFT Fever: The Latest Cryptocurrency Killing It Online
Gonzalo Álvarez Marañón

NFT Fever: The Latest Cryptocurrency Killing It Online

In May 2007, the digital artist known as Beeple decided to create and publish a new piece of artwork on the Internet every day. True to his word, he...
Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations
Pablo Alarcón Padellano

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations

We are the first partner in Spain awarded with Prisma SASE, Prisma Cloud and Cortex XDR/XSOAR specializations.
Cyber Security Weekly Briefing April 10-16
ElevenPaths

Cyber Security Weekly Briefing April 10-16

​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?
ElevenPaths

Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
Top 4 Programming Languages for Beginners
ElevenPaths

Top 4 Programming Languages for Beginners

Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
A Trillion-Dollar on Offer to the Puzzle Solver
Gonzalo Álvarez Marañón

A Trillion-Dollar on Offer to the Puzzle Solver

Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
Cyber Security Weekly Briefing April 3-9
ElevenPaths

Cyber Security Weekly Briefing April 3-9

Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
No Pain, No Gain: Let's Hack 2021
ElevenPaths

No Pain, No Gain: Let´s Hack 2021

“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
What is VPN and What is It For?
ElevenPaths

What is VPN and What is It For?

VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made...

Navegación de entradas

Previous articles
1 … 3 4 5 … 48
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration