Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 free online courses to learn IoT (Internet of Things) in 2023 Efficient and responsible milk production
  • Big Data
    • What role will Data Governance play in the Digital Transformation after COVID-19? 5 degree programs for becoming a Data Scientist
  • Cybersecurity
    • #CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer Tips to Download Apps Securely

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Big Data and the Blockchain phenomenon: Part II

Welcome back to the second half of this mini-series about the technological phenomena that is blockchain. In my previous post, we looked at how the technology works and some...
ElevenPaths

Evrial, malware that steals Bitcoins using the clipboard… and the scammed scammers

Evrial is the latest cryptocoin malware stealer, and uses the power to control the clipboard as its strongest bet to get “easy money”. Elevenpaths has took a deep technical...
AI of Things

One day Artificial Intelligence could save your life

Intensive Care Units… a place where decisions have to be instant and accurate. Any error can result in a loss of life. That’s why Clew Medical have been conducting...
ElevenPaths

#CyberSecurityPulse: Dude, Where Are My Bitcoins?

Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
AI of Things

Elena Gil, CEO of LUCA speaks to us about the potential of Big Data in business

“We are just beginning to see the opportunities that Big Data represents” The importance of data when making any decision is growing. Elena Gil, CEO at LUCA, Telefonica’s data unit,...
Beatriz Sanz Baños

“Truly the Matrix, minus the human batteries”

The Fourth Industrial Revolution is about much more than just applying today’s technology to industries. It’s about integrating intelligent cyber-physical systems such as AI and machine learning along with...
ElevenPaths

SandaS GRC, the best way to perform the GSMA IoT Security Assessment

SandaS GRC ElevenPaths SandaS GRC allows organizations to support their business strategy, improve operational performance, mitigate operational risks and ensure regulatory compliance. Is the perfect complement with which you can...
AI of Things

Could brainwave analysis turn eSport gamers into elite athletes?

Content originally written by Thomas Macaulay for TechWorld. eSports has turned gamers into digital athletes with million dollar paycheques and backing from multinationals such as Telefónica, whose technologists are optimising player...
AI of Things

Predictive Analysis and Machine Learning improving quality of life for refugees

The refugee crisis is an ongoing issue that is sadly growing by the day. Currently, it is believed that roughly 65 million people live as refugees or are displaced...
AI of Things

Come and play sports with Telefonica, and take on the best!

For another year, the city of Barcelona will welcome the largest global event in the mobile industry: the Mobile World Congress. To make the most of this moment, Barcelona’s...

Navegación de entradas

Previous articles
1 … 97 98 99 … 122
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration