Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The horizon of IoT Innovating with IoT
  • Big Data
    • Green data centers: fighting climate pollution from Internet use Towards the Fourth Industrial Revolution
  • Cybersecurity
    • New tool: PySCTChecker Cyber Security Weekly Briefing 30 January – 5 February

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Nacho Palou

Industrial digitalization: we share the keys at Advanced Factories

This week we are at Advanced Factories, the annual reference meeting on innovation and industrial automation, robotics, and digitalized industry or Industry 4.0. At Telfónica Tech, we are sharing our...
Estevenson Solano

Metaverse (II): the challenge of building a virtual space that is secure, inclusive and beneficial to everyone

As we learned in the previous article of this series, impact of the metaverse on disinformation, child security, its evolution and its potential to spread discrimination and inequalities will...
Aarón Jornet

Evolution of Spear-Phishing Techniques of Notorious Threat Groups and malware used

In recent years, different campaigns and threats have been metabolised and their entry vector has been the same, the e-mail. This initial access always seems to be the most...
Telefónica Tech

Cyber Security Weekly Briefing, 8 – 14 April

Apple fixes two new actively exploited 0-day vulnerabilities Apple has released new security advisories about two new actively exploited 0-day vulnerabilities affecting iPhones, Macs and iPads. First, there is the...
Nacho Palou

Edge AI: Artificial Intelligence outside Cloud

Edge AI refers to the execution of AI algorithms near or on devices such as wearables, mobiles, cameras, IoT (Internet of Things) sensors or edge servers, which the ability...
María Teresa Nieto Galán

Blockchain reinvents Digital Identity

The concept of Digital Identity has become increasingly important in our lives as the boundaries between real life and digital life blurred. As a result, and to the same...
Estevenson Solano

Metaverse (I): threats in an immersive, multi-sensory environment

While the discussion and excitement around the metaverse is growing, there are also feelings of doubt, fear, concern and uncertainty about the potential risks in an environment where the...
Nacho Palou

Satellites with 5G technology to provide IoT coverage worldwide

During the last edition of MWC, our colleague Javier Zorzano participated in the “5G IoT Summit: Hybrid NB-IoT and Satellite Solutions” alongside Shahbaz Ali, from Sateliot. In their talk,...
Jorge Ordovás

Rethinking consensus for a more sustainable Blockchain: from PoW to PoS

Keeping a record of information on public Blockchain networks (such as Bitcoin, Ethereum or others) involves solving the so-called “Byzantine Fault”: several contingents of the same army surround an...
María Riesgo

Technology and the young: how to turn dangers into opportunities

The technology world is moving extremely fast. If we look back, we would have never imagined the possibility of connecting to a computer without interrupting the landline phone at...

Navegación de entradas

Previous articles
1 2 3 4 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration