Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm What is Smart Retail?
  • Big Data
    • Big Data has even reached Las Fallas in Valencia Data Roles: Which is the right one for you?
  • Cybersecurity
    • What we should remind ourselves of on International Social Media Day TheTHE: The Threat Hunting Environment, our tool for researchers

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Person working on Windows 11 computer
Sergio de los Santos

Windows 11 security improves and joins Zero Trust

We look at the security features included in Windows 11. Some of them are familiar but receive substantial changes and improvements.
Edge Computing
Carlos Rebato

Edge Computing Made Simple

Edge computing is one of the technologies that will define and revolutionise the way in which humans and devices connect to the internet. It will affect industries and sectors...
Sandra Tello

Technology for the planet

Climate change is already affecting all regions on Earth, causing extreme weather incidents, including heat waves, heavy rainfall and more frequent and severe droughts. It is estimated that the...
Man searching in Google. Photo: Unsplash
Sergio de los Santos

Google takes a step forward to improve Certificate Transparency’s ecosystem: No dependence on Google

Google will change certificate transparency requirements to make it more independent of itself
MATSUKO
Innovation Marketing Team

MATSUKO, a brand-new winner for the SXSW Pitch 2022 Awards, spotted at MWC Barcelona

MATSUKO is the world’s first real-time hologram meeting app that requires only an iPhone to capture and stream people’s holograms. Using mixed and augmented reality and artificial intelligence, the...
Computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing 1–8 April

Critical vulnerability in GitLab allows access to user accounts GitLab has released a security update that fixes a total of 17 vulnerabilities, including a critical vulnerability affecting both GitLab Community...
Jorge Pereira Delgado

AI of Things (III): IoT anomalies, how a few wrong pieces of information can cost us dearly

When we hear the term Internet of Things – or IoT in short – we often think of internet-enabled fridges or the already famous smartwatches, but what does it...
NFT and microprocessor
Alexandre Maravilla

Identity for the NFTs (Non-Fungible Tokens)

There is a Twitter account committed to reporting NFT authorship scams. This type of online fraud, which is on the rise, infringes on intellectual property and currently affects artists...
Juan Manuel Ferrer

Advanced Factories or how to drive the factory to a new productive dimension

Many new friends and old friends. Last week we had the opportunity to share time, experiences, opportunities and business with colleagues, customers and suppliers. The Advanced Factories fair has...
IoT-care
Miguel Maroto

How can IoT help with elderly care?

In this second article I want to share another life experience where the technology in which I am an expert helps both to care for and make life easier...

Navegación de entradas

Previous articles
1 … 22 23 24 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration