Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 free online courses to learn IoT (Internet of Things) in 2023 We’re talking about technology, will you join the conversation?
  • Big Data
    • LUCA’s First White Paper: Surviving the AI Hype How did the temporary closure of Line 5 affect the users of Madrid’s Metro?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 25 June – 1 July #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Nacho Palou

Industrial digitalization: we share the keys at Advanced Factories

This week we are at Advanced Factories, the annual reference meeting on innovation and industrial automation, robotics, and digitalized industry or Industry 4.0. At Telfónica Tech, we are sharing our...
Estevenson Solano

Metaverse (II): the challenge of building a virtual space that is secure, inclusive and beneficial to everyone

As we learned in the previous article of this series, impact of the metaverse on disinformation, child security, its evolution and its potential to spread discrimination and inequalities will...
Aarón Jornet

Evolution of Spear-Phishing Techniques of Notorious Threat Groups and malware used

In recent years, different campaigns and threats have been metabolised and their entry vector has been the same, the e-mail. This initial access always seems to be the most...
Telefónica Tech

Cyber Security Weekly Briefing, 8 – 14 April

Apple fixes two new actively exploited 0-day vulnerabilities Apple has released new security advisories about two new actively exploited 0-day vulnerabilities affecting iPhones, Macs and iPads. First, there is the...
Nacho Palou

Edge AI: Artificial Intelligence outside Cloud

Edge AI refers to the execution of AI algorithms near or on devices such as wearables, mobiles, cameras, IoT (Internet of Things) sensors or edge servers, which the ability...
María Teresa Nieto Galán

Blockchain reinvents Digital Identity

The concept of Digital Identity has become increasingly important in our lives as the boundaries between real life and digital life blurred. As a result, and to the same...
Estevenson Solano

Metaverse (I): threats in an immersive, multi-sensory environment

While the discussion and excitement around the metaverse is growing, there are also feelings of doubt, fear, concern and uncertainty about the potential risks in an environment where the...
Nacho Palou

Satellites with 5G technology to provide IoT coverage worldwide

During the last edition of MWC, our colleague Javier Zorzano participated in the “5G IoT Summit: Hybrid NB-IoT and Satellite Solutions” alongside Shahbaz Ali, from Sateliot. In their talk,...
Jorge Ordovás

Rethinking consensus for a more sustainable Blockchain: from PoW to PoS

Keeping a record of information on public Blockchain networks (such as Bitcoin, Ethereum or others) involves solving the so-called “Byzantine Fault”: several contingents of the same army surround an...
María Riesgo

Technology and the young: how to turn dangers into opportunities

The technology world is moving extremely fast. If we look back, we would have never imagined the possibility of connecting to a computer without interrupting the landline phone at...

Navegación de entradas

Previous articles
1 2 3 4 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration