Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Five keys of IoT in Industry 4.0 IoT for Beginners (The Internet of latecomers)
  • Big Data
    • Artificial Intelligence in small and medium-sized enterprises Data Roles: Which is the right one for you?
  • Cybersecurity
    • Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020 Cyber Security Weekly Briefing January 9-15

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Data to build a better construction sector

While many sectors and as a consequence many companies are becoming data driven, some have not yet caught up to this new way of doing business. The construction and...
ElevenPaths

New tool: Neto, our Firefox, Chrome and Opera extensions analysis suite

In the innovation and laboratory area at ElevenPaths, we have created a new tool which is used to analyze browser extensions. It is a complete suite (also extensible with...
ElevenPaths

You’ve got mail? You’ve got malware

A few weeks ago I was ‘compromised’. A well-known vulnerability was exploited and I was left financially exposed, with my reputation potentially at risk. “What happened?” I hear you...
ElevenPaths

#CyberSecurityPulse: Monero and EternalRomance, the perfect formula

Last year’s release by ShadowBrokers about tools belonging to the National Security Agency continues to be a talking point. A new malware which utilizes the EternalRomance tool has appeared...
AI of Things

Are you Ready for a Wild World? Don’t miss out on Big Data for Social Good 2018!

Ready for a Wild World? Our next Big Data for Social Good event will be dedicated to Climate Change and Disaster Preparedness Although we often associate Big Data with worries...
ElevenPaths

Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS

Facebook and privacy. The recent scandal from the social network within the last few weeks does not exactly make it the best example in regards of privacy or secure...
Beatriz Sanz Baños

The benefits of energy efficiency: Much more than savings

Energy efficiency has become the ‘first fuel’ of the 30 countries that belong to the International Energy Agency (IEA), including Spain. This means that the energy saved by the members...
AI of Things

Can mobile phone traces help shed light on the spread of Zika in Colombia?

Content written by Daniela Perrotta, ISI Foundation researcher and UN Global Pulse fellow and Enrique Frias-Martinez, Researcher, Telefonica Research, Madrid. Originally posted on the UN Global Pulse blog. Nowadays, thanks...
ElevenPaths

In search of improved cryptocurrency privacy with Dash, Zcash and Monero

When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
AI of Things

An introduction to Machine Learning: “What are Insights?”

Content originally written in Spanish by Paloma Recuero de los Santos, LUCA Brand Awareness. Within LUCA, we often talk of “Insights“. Our tools are designed to obtain valuable “Insights”, or “Actionable Insights” that...

Navegación de entradas

Previous articles
1 … 93 94 95 … 122
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Latch, new ElevenPaths' service
During the time we’ve been working in ElevenPaths we’ve faced many kind of events internally, buy one of the most exciting and awaited is the birth of Latch. It’s a technology of our...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration