Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Green data centers: fighting climate pollution from Internet use When will Robots find a place in the Smart Home?
  • Big Data
    • Our top 5 LUCA events in March Internet of Things… Archaeological Sites
  • Cybersecurity
    • Cyber Security Weekly Briefing, 26 November – 2 December Bestiary of a Poorly Managed Memory (III)

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS

Facebook and privacy. The recent scandal from the social network within the last few weeks does not exactly make it the best example in regards of privacy or secure...
AI of Things

Can mobile phone traces help shed light on the spread of Zika in Colombia?

Content written by Daniela Perrotta, ISI Foundation researcher and UN Global Pulse fellow and Enrique Frias-Martinez, Researcher, Telefonica Research, Madrid. Originally posted on the UN Global Pulse blog. Nowadays, thanks...
ElevenPaths

In search of improved cryptocurrency privacy with Dash, Zcash and Monero

When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
AI of Things

An introduction to Machine Learning: “What are Insights?”

Content originally written in Spanish by Paloma Recuero de los Santos, LUCA Brand Awareness. Within LUCA, we often talk of “Insights“. Our tools are designed to obtain valuable “Insights”, or “Actionable Insights” that...
ElevenPaths

AMSI, one step further from Windows malware detection

At the beginning it was a virus; pieces of assembly code which connected to the files, so that they could modify the “entrypoint”. Afterwards, this technique was twisted and...
AI of Things

Data and Human Resources: a close relationship

We live in an era of burnout, information overload and a battle for work-life balance. More and more, we can see the evolution of Human Resources (HR) into not...
AI of Things

First results of the OOH advertising project in Brazil

On the 26th March, Clear Channel, JCDecaux and Otima presented the results of the OOH map campaigns in Rio de Janeiro and São Paulo that were carried out alongside...
ElevenPaths

#CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

Social networks image The Internet giants are going to great lengths to be transparent with their communication about the information they are gathering from their users. In the case...
AI of Things

AI is invading the world of entertainment

Previously in our blog, we have seen how Artificial Intelligence (AI) can help make societies safer and even, in a not too distant future, save lives. In this post,...
ElevenPaths

A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network

A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...

Navegación de entradas

Previous articles
1 … 80 81 82 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration