Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Worker’s Diary IoT II 7 objects that you did not know are IoT
  • Big Data
    • New ways of working with Artificial Intelligence Ending cyberbullying using artificial intelligence and machine learning
  • Cybersecurity
    • Evolution of Spear-Phishing Techniques of Notorious Threat Groups and malware used AMSI, one step further from Windows malware detection

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Ana Zamora

Big Data and Tourism: How this Girona Festival became Data-Driven

Every year, from the 9th to the 17th of May, Girona celebrates the “Temps de Flors”,  one of the most popular flower festivals in Europe. For ten days, the...
Florence Broderick

You can still win 5000 dollars. Send your Latch plugins over!

Remember that on Monday, December 12 at 1pm (CET), the deadline for the submission of applications for our Latch plugins competition ends. You’ve had almost two months to think...
AI of Things

International call traffic may tell you more than first thought

This post debates the value of international phone calls in understanding society. Telefónica has a wide global infrastructure of networks which can be used by other service providers to carry...
Richard Benjamins

Artificial Intelligence: What even is that?

Artificial Intelligence (AI) is the hottest topic out there at the moment, and often it is merely associated with chatbots such as Siri or other cognitive programs such as...
Florence Broderick

Telefónica Mannequin Challenge

Today in the office we decided to do our very own Mannequin Challenge, bringing together employees from all over Telefónica. This viral internet craze has even frozen the internet...
AI of Things

Can Mobile Data combat Climate Change in Germany?

One of our favourite topics here at LUCA is using Big Data for Social Good, to measure our progress on Sustainable Development Goals. Three of the 17 goals are...
Florence Broderick

Take part in Latch Plugins Contest with such hacks as Paper Key. Are you game?

At Elevenpaths there is a tradition of developing innovation and training the ability to transform an idea into something tangible, as you might know that in development process, projects...
AI of Things

Commuter Traffic: Can Big Data solve the problem?

When we sit in our daily traffic jams, many of us may think: Where do the other commuters come from? Where are they on their way to? Are we...
Florence Broderick

Big Dating: Could AI be the real matchmaker on Tinder?

Online dating platforms such as Tinder, Happn and Hinge are seeing exponential growth, slowly sliding on to the home screens of smartphone users all over the world.  Last week...
Florence Broderick

ElevenPaths and Etisalat Digital announce their collaboration for Mobile Security R&D

Madrid, November 21 2016.– ElevenPaths, Telefónica Cyber Security Unit, and Etisalat Digital, two of the world’s leading providers of communications services and solutions, announced today their collaboration in the...

Navegación de entradas

Previous articles
1 … 104 105 106 … 120
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration