Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What’s the role of satellite connectivity in an IoT world? Madrid is IoT
  • Big Data
    • Green data centers: fighting climate pollution from Internet use The art of communication in times of change
  • Cybersecurity
    • Rock appround the clock, our research in DEFCON New FARO Version: Create Your Own Plugin and Contribute to Its Evolution

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
The base rate falacy
ElevenPaths

The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised

Before starting your workday, while your savoring your morning coffee, you open your favorite cybersecurity newsletter and an advertisement on a new Intrusion Detection System catches your attention: THIS IDS...
AI of Things

AI will enable doctors to spend more time with their patients

The technical revolution within the NHS suggested in this report could not have come at a better time. We have doctors and GPs overburdened with more and more patients...
If you want to change your employees’ security habits, don’t call their will, modify their environment instead
ElevenPaths

If you want to change your employees’ security habits, don’t call their will, modify their environment instead

You’re in a coffee bar and you need to connect your smartphone to a Wi-Fi, so you check your screen and see the following options. Imagine that you know...
New born gazelle
Rubén Granados

Reinforcement learning…. the new player

Here, we would like to present a ´new´ guest, reinforcement learning (RL). Not as new, because it has been with us since the 80s. We will quickly go over the classic approximations, that...
Diego Martín Moreno

What are Blockchain and Smart Contracts?

Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
Don’t confuse the frequency of an incident with the ease you remember it
ElevenPaths

Don’t confuse the frequency of an incident with the ease you remember it

Imagine that there have been a few robberies in two parks of your town that have got all the attention for days. This afternoon you would like to go...
AI of Things

Blockchain and IoT predictions for 2019

Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
ElevenPaths

GSMA IoT Security Champion: Award to our IoT Security team

We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
Paloma Recuero de los Santos

Python for all (5): Finishing your first Machine Learning experiment with Python

We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
AI of Things

The Forrester Wave™: Specialized Insights Service Providers

2018 was an excellent year for us, in which we were recognised as a leader amongst specialized insights service providers by Forrester. The independent review highlights the importance of...

Navegación de entradas

Previous articles
1 … 68 69 70 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration