Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The impacts and benefits of telemetry in Industrial m2m processes Telefónica Tech AI of Things made real
  • Big Data
    • Smart football stadiums: the world’s greatest show, made even better The Chief Data Officer: What can they do for your company?
  • Cybersecurity
    • Mobile Malware, part of the Generation Z Cybersecurity Weekly Briefing 26 September – 2 October

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS

Facebook and privacy. The recent scandal from the social network within the last few weeks does not exactly make it the best example in regards of privacy or secure...
AI of Things

Can mobile phone traces help shed light on the spread of Zika in Colombia?

Content written by Daniela Perrotta, ISI Foundation researcher and UN Global Pulse fellow and Enrique Frias-Martinez, Researcher, Telefonica Research, Madrid. Originally posted on the UN Global Pulse blog. Nowadays, thanks...
ElevenPaths

In search of improved cryptocurrency privacy with Dash, Zcash and Monero

When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
AI of Things

An introduction to Machine Learning: “What are Insights?”

Content originally written in Spanish by Paloma Recuero de los Santos, LUCA Brand Awareness. Within LUCA, we often talk of “Insights“. Our tools are designed to obtain valuable “Insights”, or “Actionable Insights” that...
ElevenPaths

AMSI, one step further from Windows malware detection

At the beginning it was a virus; pieces of assembly code which connected to the files, so that they could modify the “entrypoint”. Afterwards, this technique was twisted and...
AI of Things

Data and Human Resources: a close relationship

We live in an era of burnout, information overload and a battle for work-life balance. More and more, we can see the evolution of Human Resources (HR) into not...
AI of Things

First results of the OOH advertising project in Brazil

On the 26th March, Clear Channel, JCDecaux and Otima presented the results of the OOH map campaigns in Rio de Janeiro and São Paulo that were carried out alongside...
ElevenPaths

#CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

Social networks image The Internet giants are going to great lengths to be transparent with their communication about the information they are gathering from their users. In the case...
AI of Things

AI is invading the world of entertainment

Previously in our blog, we have seen how Artificial Intelligence (AI) can help make societies safer and even, in a not too distant future, save lives. In this post,...
ElevenPaths

A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network

A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...

Navegación de entradas

Previous articles
1 … 80 81 82 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration