Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Movistar Car: transform your vehicle into a connected car How can IoT help with elderly care?
  • Big Data
    • Artificial Intelligence, making its mark in Hollywood Our Christmas Lip Sync
  • Cybersecurity
    • Cybersecurity Weekly Briefing July 11-17 Will Rust save the world? (I)

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Big Data: Revolutionizing Animal Conservation

Until recently not a topic that has captured the attention of many, animal conservation is a serious problem that needs addressing. Sustainable development goal number 15 from the United...
ElevenPaths

Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research

We have been for a long time researching about HSTS, HPKP, certificate pinning and TLS technologies in general. As a collateral effect of this work, we have found some...
ElevenPaths

#CyberSecurityPulse: Injection and XSS, the Most Critical Web Application Security Risks

The Open Web Application Security Project (OWASP) has just updated the top ten list of web app vulnerabilities for the first time since 2013 but not much has actually...
ElevenPaths

SealSign integration with the Azure Key Vault

ElevenPaths and Microsoft, thanks to Gradiant technology, have integrated the Azure Key Vault into the SealSign platform. This partnership provides a server-based digital signature and certificate safekeeping service, based...
AI of Things

SafePost: Technology available to the user at any moment

Today SafePost was born, a new service that allows publication on social media and the sending of emails by using SMS. The mobile technology is building a better world...
ElevenPaths

Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (II)

What would you expect from a computer network that belongs to a terrorists group? Super-encrypted material? Special passwords? The Central Intelligence Agency (CIA) on 1 November 2017 released additional...
AI of Things

5 uses of data on Black Friday

There are many stories that suggest how the term ‘Black Friday’ came into use. One common misconception often shared is that Black Friday gets its name from the first...
ElevenPaths

Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (I)

What would you expect from a computer network that belongs to a terrorists group? Super-encrypted material? Special passwords? The Central Intelligence Agency (CIA) on 1 November 2017 released...
ElevenPaths

The Data Transparency Lab strengthens its work on data transparency after investing over one million euros in three years

Barcelona becomes the permanent headquarters of the DTL Annual Conference, which will take place from 11 to 13 December. The DTL is a clear example of the various innovation projects...
AI of Things

Trump: one year in data

A little over a year ago we saw an American election that sent shockwaves through the political world. Donald J. Trump, the Republican candidate, went head-to-head with Hillary Clinton...

Navegación de entradas

Previous articles
1 … 86 87 88 … 121
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration