Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How to know how smart a Smart City is Advances of Industria 4.0 and its impact on society
  • Big Data
    • Analysing tourist profiles in Spain with INE How Big Data & Artificial Intelligence are having a positive impact in the sport of Rugby Union
  • Cybersecurity
    • Women’s Engineering Day: Building New Paths Facebook affected by compromise of JavaScript development packages

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

Accelerating European cyber security between the United Kingdom and Telefonica (Wayra) – Part one of two

The GCHQ (Government Communications Headquarters) is not very well known outside of the United Kingdom. The governmental organization is almost a century old (it will celebrate its 100th anniversary...
ElevenPaths

#CyberSecurityPulse: Tell me your social networks and you will be welcome in the United States (or maybe not)

The US Department of State wants to ask visa applicants to provide details of their social networks which they have used within the last five years, as well as...
AI of Things

Weve launches Weve Locate – Location verification technology

Weve, O2´s mobile advertising subsidiary has recently launched a new service, Weve Locate, a location verification product. This new service will allow advertisers to truly reach their target audiences,...
ElevenPaths

The Wannacry authors also want their Bitcoin Cash

The 12th of May 2017 was a day for many of us which we will not easily forget. Wannacry was one of those incidents which had a major impact...
AI of Things

Using Big Data to combat Air Pollution in Brazil

Content originally written by Raquel Carretero Juárez, for the Telefonica Public Policy Blog.   Telefónica Brazil is using mobile network Big Data to monitor air pollution in São Paulo (Brazil) and...
Beatriz Sanz Baños

IoT to save the environment

Connectivity allows a more efficient and sustainable energy management with the environment. The fight against climate change, waste of water and residual waste is easier with IoT devices.
Salmerón Uribes Marina

New experiences in the stores of the future

The digital transformation of brick-and-mortar stores and their integration with other channels is an inevitable process. It is also the best way to rise to the challenge that 100%...
ElevenPaths

#CyberSecurityPulse: PyeongChang Olympics: A New False Flag Attack?

A postmortem of the Olympic Destroyer malware used in the PyeongChang Olympics attack reveals a deliberate attempt by adversaries to plant a false flags when it comes to attribution,...
AI of Things

Safer Societies using Facial Recognition

Facial recognition systems have been around for decades, and were first developed by the computer scientist Woodrow Bledsoe in 1964. Nowadays, such technology is a common part of our...
AI of Things

3 daily services that rely on machine learning

Machine Learning [ML] has become a term everyone is accustomed to hearing about, yet it still feels very distant to many. Some people can be led to believe that...

Navegación de entradas

Previous articles
1 … 95 96 97 … 122
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration