Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC 2017: The evolution of connectivity and new uses for IoT How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm
  • Big Data
    • LUCA White Paper: Data as a Force for Good Boosting Peru’s Tourism Industry with Big Data
  • Cybersecurity
    • Cyber Security Weekly Briefing 25 September – 1 October Fraud Orchestration is Helping Financial Institutions Fight Fraud in Real-Time

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Cyber Security Briefing
Telefónica Tech

Cyber Security Weekly Briefing 2-8 October

Apache vulnerabilities actively exploited Earlier this week, Apache fixed a 0-day (CVE-2021-41773) affecting Apache HTTP servers which was actively being exploited. However, on Thursday we learned that the patch released...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
Cyber Security Weekly Briefing 25 September - 1 October
ElevenPaths

Cyber Security Weekly Briefing 25 September – 1 October

​​​​Let’s Encrypt root certificate expires (DST Root CA X3) A few days ago, Scott Helme, founder of Security Headers, highlighted the 30 September as the date when Let’s Encrypt’s root certificate, DST...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
Cyber Security Briefing 18-24 sep
Telefónica Tech

Cyber Security Weekly Briefing 18-24 September

Malware campaign using TeamViewer on websites under IIS Malwarebytes researchers have observed a malware distribution campaign since the beginning of September that makes use of previously compromised pages running on Microsoft’s...
Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Little Red Riding Hood
José Vicente Catalán

What Little Red Riding Hood teaches us about cyber security

They say that a good fairy tale will be considered as such if it has many different readings and is able to convey hundreds of different messages. Little Red...
People at the core of our technology
Telefónica Tech

People at the core of our technology

At Telefónica Tech we are passionate about technology, but there is something we love even more: people. It is people who give meaning to technology and not the other...
Innovation Marketing Team

Empowering women in entrepreneurship: 10 female – led startups in Germany

In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...

Navegación de entradas

Previous articles
1 … 30 31 32 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Telefónica and ElevenPaths present new Path6 solution, alliances and investments
Third anniversary of leadership in innovation and cybersecurity TELEFÓNICA AND ELEVENPATHS PRESENT THE PATH6 SOLUTION, THEIR NEW ALLIANCES AND INVESTMENTS IN THE IV SECURITY INNOVATION DAY New alliances with prominent...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration