Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT in Hotels Smart gas stations and how to find them
  • Big Data
    • Strata Data Conference London 2017 More countries focus on Artificial Intelligence
  • Cybersecurity
    • Cyber Security Weekly Briefing 2-8 October #CyberSecurityPulse: Oops, I Went Running and I Published Information From Secret Locations

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques

Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
AI of Things

Traffic spikes before football games? The effect of the World Cup in Germany

Post written by Telefónica NEXT  Once every four years, The FIFA World Cup brings fans together in a month of surprising events. Every game is different, but each is filled...
AI of Things

How Germany Moves project wins at the German Online Communications Awards

In another post from the start of this year, which you can read here, we presented the interactivty mobility map that our colleagues at Telefónica NEXT in Germany had created....
ElevenPaths

#CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States

After just over two years of Congress passed a major bill that encouraged businesses to share with the government how and when threat actors were trying to get into...
AI of Things

A history of Lisp and its use in neural networks – Part I

Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Today we kick off a new series that will consist in two articles in which we will briefly introduce you to...
AI of Things

Do not miss what happened at NID 2018: WE ARE IN

Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
ElevenPaths

#CyberSecurityPulse: New proposal to adapt U.S. Marine Corps capabilities to the new times

The head of the U.S. Marine Corps wants to remodel his team. The Marine Corps is considering offering bonuses and other benefits to attract older, more experienced Marines to...
Richard Benjamins

Lessons learned from The Cambridge Analytica / Facebook scandal

It has been now some time that the Cambridge Analytica / Facebook scandal was first revealed on March 17, 2018 by The Guardian and the New York Times. Much has been...

Navegación de entradas

Previous articles
1 … 76 77 78 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration