Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Blockchain opportunities for IoT Now the lighting is also smart
  • Big Data
    • The acceleration of the insurance sector in Big Data The data-driven transformation of businesses, a matter of survival
  • Cybersecurity
    • Your MacOS System Is Also A Target for Cybercrime – Protect It! Cyber Security Weekly Briefing June 5-11

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques

Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
Beatriz Sanz Baños

The future of Internet of Things

Looking at just how much the internet has changed our lives, it’s incredible to imagine how some people didn’t took it seriously at the beginning. One of the reasons...
AI of Things

Traffic spikes before football games? The effect of the World Cup in Germany

Post written by Telefónica NEXT  Once every four years, The FIFA World Cup brings fans together in a month of surprising events. Every game is different, but each is filled...
Beatriz Sanz Baños

Say goodbye to traffic jams

The hours that we lose in traffic jams in big cities would be better used in what really matters to us thanks to the Internet of Things. We are talking...
AI of Things

How Germany Moves project wins at the German Online Communications Awards

In another post from the start of this year, which you can read here, we presented the interactivty mobility map that our colleagues at Telefónica NEXT in Germany had created....
ElevenPaths

#CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States

After just over two years of Congress passed a major bill that encouraged businesses to share with the government how and when threat actors were trying to get into...
AI of Things

A history of Lisp and its use in neural networks – Part I

Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Today we kick off a new series that will consist in two articles in which we will briefly introduce you to...
AI of Things

Do not miss what happened at NID 2018: WE ARE IN

Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...

Navegación de entradas

Previous articles
1 … 89 90 91 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration