Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5G – The Key Technology for the development of IoT The importance of labeling: spotlabel
  • Big Data
    • New ways of working with Artificial Intelligence How AI is revolutionising the Classical Music industry: An analysis of the musical AI by Aiva Technologies
  • Cybersecurity
    • Cyber Security Weekly Briefing 20-26 November Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques

Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
AI of Things

Traffic spikes before football games? The effect of the World Cup in Germany

Post written by Telefónica NEXT  Once every four years, The FIFA World Cup brings fans together in a month of surprising events. Every game is different, but each is filled...
AI of Things

How Germany Moves project wins at the German Online Communications Awards

In another post from the start of this year, which you can read here, we presented the interactivty mobility map that our colleagues at Telefónica NEXT in Germany had created....
ElevenPaths

#CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States

After just over two years of Congress passed a major bill that encouraged businesses to share with the government how and when threat actors were trying to get into...
AI of Things

A history of Lisp and its use in neural networks – Part I

Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Today we kick off a new series that will consist in two articles in which we will briefly introduce you to...
AI of Things

Do not miss what happened at NID 2018: WE ARE IN

Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
ElevenPaths

#CyberSecurityPulse: New proposal to adapt U.S. Marine Corps capabilities to the new times

The head of the U.S. Marine Corps wants to remodel his team. The Marine Corps is considering offering bonuses and other benefits to attract older, more experienced Marines to...
Richard Benjamins

Lessons learned from The Cambridge Analytica / Facebook scandal

It has been now some time that the Cambridge Analytica / Facebook scandal was first revealed on March 17, 2018 by The Guardian and the New York Times. Much has been...

Navegación de entradas

Previous articles
1 … 76 77 78 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration