Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Activation: the IoT Program for Startups How AI & IoT will save the Aviation Industry
  • Big Data
    • How the workers travel to Distrito T? Big Data for Social Good: How 6 billion mobile phones are social sensors to save lives
  • Cybersecurity
    • AuthCode: Our award-winning continuous-authentication system, jointly developed with the University of Murcia Cybersecurity Weekly Briefing November 21-27

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Innovation and Laboratory Area in ElevenPaths

Cyber Security State: Top Threats, Risks and Vulnerabilities

There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. The Innovation and Lab team has just launched our own...
Jorge Ordovás

Decentralised social networks: Could this be the first Web3 service to reach the mass public?

If we had to highlight one of the most relevant proposals in the field of Web3 during the last months of 2022, we would probably have to talk about...
Javier Coronado Blazquez

Ghosts in the machine: does Artificial Intelligence suffer from hallucinations?

Artificial Intelligence (AI) content generation tools such as ChatGPT or Midjourney have recently been making a lot of headlines. At first glance, it might even appear that machines “think”...
Telefónica Tech

Cyber Security Weekly Briefing, 11 – 17 February

Apple fixes actively exploited 0-day Apple has issued several security advisories to fix an actively exploited 0-day vulnerability. The security flaw, listed as CVE-2023-23529, is a type confusion in the browser’s...
Miryam Artigas

Using Midjourney to create social media content

Any sentence containing the word ‘dinosaur’ is worthy of attention. Admit it, it happens to you too. And if not, I’ll tell you why we’re talking about dinosaurs in a...
Marta Mallavibarrena

Artificial Intelligence, ChatGPT, and Cyber Security

Artificial Intelligence (AI) has become a frequent topic on this blog. Almost all predictions of technological trends for the coming years include it as one of the key advances. In...
Nacho Palou

We are now live! Discover the new Telefónica Tech website

We have redesigned the Telefónica Tech website to represent who we are as a digital solutions integrator. We also want to share what we do, who is behind it...
Íñigo Echavarri

The role of “Threat Hunting” as an enabler in ransomware incident response

Following in the wake of the articles developed to shed light on incident response in our group, it seems clear that the actions required to deploy ransomware with the...
Telefónica Tech

Cyber Security Weekly Briefing, 4 – 10 February

Critical vulnerability in Atlassian Jira Atlassian has issued a security advisory in which it releases fixes to resolve a critical vulnerability in Jira Service Management Server and Data Center. According to...
Telefónica Tech

How I won a Capture the Flag competition by solving challenges using my mobile phone

David Soto, winner of the challenge, collecting the prize together with Humbert Ruiz, from 42 Barcelona, Fundación Telefónica’s programming campus. We organised activities aimed at the technical audience in the...

Navegación de entradas

Previous articles
1 … 5 6 7 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration