Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Success Story: achieving an audience based strategy How IoT and Big Data is elevating Energy Management
  • Big Data
    • LUCA Talk: RCS for Business Messaging, a New Generation GDPR 101: What you need to know
  • Cybersecurity
    • Zerologon, Patch or Die! Cyber Security Weekly Briefing, 30 July – 5 August

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Everything You Need to Know About SSL/TSL Certificates
ElevenPaths

Everything You Need to Know About SSL/TLS Certificates

What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and a...
AI of Things

Artificial Intelligence of Things, how things plan to make our lives simpler

Just as in the Grimm Brothers fairy tale where two little elves teamed up to help the cobbler have a better life, Artificial Intelligence and IoT, Big Data technologies...
NextDefense: The ultimate cyber defence solution for any organisation
Nikolaos Tsouroulas

NextDefense: The ultimate cyber defence solution for any organisation

It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving....
Patrick Buckley

AI in Policing, how technology is helping to keep us safe

Artificial intelligence and IoT technologies continue to revolutionise the way in which we live around the world. In today’s post we take a brief look at how technologies enhance...
Kassandra Block

How Artificial Intelligence is helping companies to improve their customer relationship: Vivo’s success story in Brazil

During the pandemic, the need for companies to use digital channels in order to provide a quality customer service has become evident. An example of this digitalisation in its...
Your MacOS System Is Also A Target for Cybercrime – Protect It!
Carlos Ávila

Your MacOS System Is Also A Target for Cybercrime – Protect It!

According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This...
Cyber Security Weekly Briefing March 6-12
ElevenPaths

Cyber Security Weekly Briefing March 6-12

FluBot botnet behind messaging company impersonation campaign Last Friday, researchers at Threat Fabric named the threat behind the campaign to impersonate SMS messaging companies. Specifically, they talk about the Cabassous malware, a...
Patrick Buckley

Was there life of Mars? How AI is helping us find the answer

On July 30th 2020, the Atlas V-541 rocket, carrying the Perseverance rover launched from the Cape Canaveral Air Force Station, Florida. Six and a half months later, on February the...
The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)
Martiniano Mallavibarrena

The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)

In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of...
#LadyHacker 1
ElevenPaths

#LadyHacker 2021, IT’S HERE!

If you’ve never heard of #LadyHacker you’re probably wondering what this hashtag is or what it means. Don’t get it wrong, #LadyHacker is not a hashtag, it’s an initiative...

Navegación de entradas

Previous articles
1 … 35 36 37 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration