Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A digital twin to save the Mar Menor Bed time will never be the same
  • Big Data
    • Case Study: Netshoes sponsors its mobile website and app with great results Big Data: moneymaker and force for social good?
  • Cybersecurity
    • COVID-19, Insight from the Telco Security Alliance Keys to Implementing a 360 Corporate Digital Identity

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Big Data: Revolutionizing Animal Conservation

Until recently not a topic that has captured the attention of many, animal conservation is a serious problem that needs addressing. Sustainable development goal number 15 from the United...
ElevenPaths

Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research

We have been for a long time researching about HSTS, HPKP, certificate pinning and TLS technologies in general. As a collateral effect of this work, we have found some...
ElevenPaths

#CyberSecurityPulse: Injection and XSS, the Most Critical Web Application Security Risks

The Open Web Application Security Project (OWASP) has just updated the top ten list of web app vulnerabilities for the first time since 2013 but not much has actually...
ElevenPaths

SealSign integration with the Azure Key Vault

ElevenPaths and Microsoft, thanks to Gradiant technology, have integrated the Azure Key Vault into the SealSign platform. This partnership provides a server-based digital signature and certificate safekeeping service, based...
AI of Things

SafePost: Technology available to the user at any moment

Today SafePost was born, a new service that allows publication on social media and the sending of emails by using SMS. The mobile technology is building a better world...
ElevenPaths

Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (II)

What would you expect from a computer network that belongs to a terrorists group? Super-encrypted material? Special passwords? The Central Intelligence Agency (CIA) on 1 November 2017 released additional...
AI of Things

5 uses of data on Black Friday

There are many stories that suggest how the term ‘Black Friday’ came into use. One common misconception often shared is that Black Friday gets its name from the first...
ElevenPaths

Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (I)

What would you expect from a computer network that belongs to a terrorists group? Super-encrypted material? Special passwords? The Central Intelligence Agency (CIA) on 1 November 2017 released...
ElevenPaths

The Data Transparency Lab strengthens its work on data transparency after investing over one million euros in three years

Barcelona becomes the permanent headquarters of the DTL Annual Conference, which will take place from 11 to 13 December. The DTL is a clear example of the various innovation projects...
AI of Things

Trump: one year in data

A little over a year ago we saw an American election that sent shockwaves through the political world. Donald J. Trump, the Republican candidate, went head-to-head with Hillary Clinton...

Navegación de entradas

Previous articles
1 … 86 87 88 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
ElevenPaths with triple representation at the eCrime 2015 conference
This year, the antiphishing working group organizes the eCrime 2015 conference in Barcelona from May 26 to 29. This symposium on eCrime investigation is attended by professionals who have...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration