Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 amazing things at CES 2018 IoT and Big Data in football to enable intelligent decision making
  • Big Data
    • Whatsapp is down, now what? LUCA at #HackForGood
  • Cybersecurity
    • Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020 Cyber Security Weekly Briefing February 6-12

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Jorge González

How can we make water consumption more efficient?

Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient. Water...
AI, Eva
Santiago Morante Cendrero

Artificial Intelligence in fiction: Eva, by Kike Maíllo

Are you afraid your food processor will rebel and poison your lentils? Do you think your Roomba is watching you? Do you wear a hat when you see a...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Alexandre Maravilla

Onboarding and biometric authentication to fight online fraud

Online fraud has experienced a significant growth since the early 2020s pandemic accelerated the digital transformation of businesses and citizens. This is evidenced by the latest report from the...
Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
diversity technology field
Sandra Tello

The COVID crisis and diversity in the technology field

The pandemic has highlighted the need for STEM profiles The coronavirus pandemic is estimated to have accelerated digitalisation by 5 to 10 years. This means that the technology sector will...
Telefónica Tech

Cyber Security Weekly Briefing 4 – 10 December

Catalan government suffers DDoS attack According to the statement issued by the Catalan government, the Centre de Telecomunicacions i Tecnologies de la Informació (CTTI) detected last Friday a cyber-attack that compromised more...
Roberto García Esteban

Cloud services enabling remote working

There is no doubt that the hybrid model in which face-to-face and remote work is shared is here to stay in companies all over the world, including SMEs. To...
Cyber Security Weekly Briefing 20-26 November
Telefónica Tech

Cyber Security Weekly Briefing 27 November – 3 December

Apple and Google fined 20 million for using user data The Italian Competition and Market Authority (AGCM) has fined both Google and Apple 10 million euros for their method of...
The impact of cybersecurity attacks on SMEs and corporates
New Markets Team

The impact of cybersecurity attacks on SMEs and corporates

New Markets from Telefónica Cyber & Cloud Tech, together with Telefónica Global Solutions and GlobalData delivered a webinar highlighting the impact of cybersecurity attacks on both small and medium-sized...

Navegación de entradas

Previous articles
1 … 27 28 29 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration