Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 free online courses to learn IoT (Internet of Things) in 2023 Efficient and responsible milk production
  • Big Data
    • What role will Data Governance play in the Digital Transformation after COVID-19? 5 degree programs for becoming a Data Scientist
  • Cybersecurity
    • #CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer Tips to Download Apps Securely

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Ending cyberbullying using artificial intelligence and machine learning

Cyberbullying, defined as “the use of electronic communication to bully a person” by Oxford Dictionaries, is a worrying problem in our increasingly connected society. Nowadays, it is perhaps most...
ElevenPaths

#CyberSecurityPulse: Oops, I Went Running and I Published Information From Secret Locations

The popular fitness tracking app Strava proudly published a 2017 heat map showing activities from its users around the world, but unfortunately, the map revealed locations of the United...
Beatriz Sanz Baños

The emotions of IoT

Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
AI of Things

Which country will lead the race for AI dominace?

Every January, the World Economic Forum meets in the Swiss mountain resort of Davos, bringing together politicians, economists, business leaders and more to discuss the key issues of the...
AI of Things

A closer look at the GRAMMY Awards 2018

Now that January is here, it is time to look forward to one of the year’s standout events, the GRAMMYs 2018. This year, the prestigious event will be held...
Pablo Alarcón Padellano

Managed Detection & Response: Prevention is Not Enough, You Need to Become Cyber-Resilient

You want your organization to be cyber-resilient but you have no means? You have advanced security solutions in place, but you lack skilled staff trained to take advantage of them? You...
AI of Things

5 jobs that you didn’t know used Data Science

Content originally written by Ane Urain Gurruchaga, LUCA Brand Awareness. From taking the metro, to choosing a film that best fits your tastes, the presence of data is undeniable in...
ElevenPaths

#CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
AI of Things

Enhancing customer experiences with Smart Digits.

On November 21st 2017, we hosted a webinar about accelerating the digital transformation with LUCA’s Smart Digits product portfolio. Smart Digits is a B2B platform and set of secure...
Beatriz Sanz Baños

Fashion connected: the IoT revolution in the textile sector

Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...

Navegación de entradas

Previous articles
1 … 98 99 100 … 122
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration