Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • When will Robots find a place in the Smart Home? The future of Internet of Things
  • Big Data
    • Telefónica Tech, the new technologies blog Artificial Intelligence: What even is that?
  • Cybersecurity
    • Cyber Security Weekly Briefing 6-12 November Cybersecurity Weekly Briefing September 5-11

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

GDPR 101: What you need to know

On 25 May, the much talked about General Data Protection Regulation (GDPR), came into force. This new regulation has the primary objective of governing the gathering, using and sharing...
AI of Things

Our 5 Favorite Free Data Courses

Although it might seem like a nearly impossible feat, it is never too late to learn about Big Data, Machine Learning, and everything in between. You can get test...
ElevenPaths

Analyzing browser extensions with Neto Console

Fifteen days ago we published the first version of Neto, our extensions analyzer in Github. It was published under a free license, also during this time we have worked...
AI of Things

Meet the Hyperconnected Museums of the Future

Today, Friday 18th May, museum all around the globe are taking part in the International Museum Day. This is an annual event organized by the International Council of Museums...
AI of Things

Download your eBook, The Data Economy: Wealth 4.0

Last month, the Telefonica Foundation, in collaboration with Afi (International Financial Analysts), Ariel and Editorial Planeta, published “The Data Economy: Wealth 4.0” which we at LUCA invite you to...
ElevenPaths

#CyberSecurityPulse: The eternal dispute: backdoors and national security

A bipartisan group of legislators from the house of representatives has introduced a piece of legistation which will prevent the federal government of the United States from demanding companies...
ElevenPaths

Technically analysing a SIEM… are your logs secure?

The SIEMs are usually utilized within highly secure of regulated environments, where regular log monitoring and analysis is required to search for security incidents. They help to make...
AI of Things

A formula for Victory: Big Data in Formula 1

Japan 1990, most die-hard Formula 1 fans remember the eventful race in Suzuka circuit. As was usual during the late 80’s and early 90’s, Ayrton Senna and Alain Prost,...
ElevenPaths

New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software

ElevenPaths has spotted an enhanced and evolving Brazilian banking trojan (probably coming from KL Kit,) through using a new technique to bypass the SmartScreen reputation system and avoid detection...
AI of Things

Using Data to Manage Emergency Situations

Content originally written by Carmen Rodríguez, intern at LUCA, and Javier Carro, Data Scientist within LUCA’s Big Data for Social Good area. What would you say if we told you...

Navegación de entradas

Previous articles
1 … 92 93 94 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration