Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A world-champion IoT Women’s Engineering Day: Building New Paths
  • Big Data
    • Dining with Data Big Data and Artificial Intelligence solutions for the tourism industry
  • Cybersecurity
    • Analysis of APPs Related to COVID19 Using Tacyt (II) Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Nacho Palou

Blockchain for increasing security in the buying and selling of vehicles

Digital technologies such as connectivity, Internet of Things or Artificial Intelligence are becoming increasingly common in vehicles. For example, in the form of digital assistants, mobility services, or advanced...
Santiago Morante Cendrero

Artificial Intelligence in Fiction: The Bestiary Chronicles, by Steve Coulson

It is common in the era of Artificial Intelligence (AI) to hear about how this technology can revolutionise different areas of human life, from medicine to manufacturing. However, in...
Telefónica Tech

Cyber Security Weekly Briefing, 31 December – 6 January

PyTorch’s dependency chain is breached PyTorch, a popular open-source machine learning framework, has warned users who installed PyTorch-nightly between 25 and 30 December 2022 to uninstall the framework and the...
ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Alexandre Maravilla

Web3 and the evolution of Internet Identity

The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...
Telefónica Tech

Cyber Security Weekly Briefing, 24 – 30 December

LastPass confirms theft of customer passwords LastPass has announced that its cloud storage system was breached using stolen passwords in an incident last August. The attackers gained access to the...
Nacho Palou

Cybersecurity: 13 posts to stay informed and protected from cyberthreats

With the digitization of companies and organizations and our increasing reliance on digital technologies, data and information protection must be prioritized. The adoption of cutting-edge digital technologies is not only...
Nacho Palou

AI of Things: 9 essential posts to say goodbye to 2022

AI of Things (Artificial Intelligence of Things) is the set of technologies that bring together IoT devices —physical objects with sensors, software and connectivity— with Big Data and Artificial...
Telefónica Tech

Cyber Security Weekly Briefing, 17 – 23 December

SentinelOne: malicious Python package in PyPI Researchers at ReversingLabs have published an investigation in which they report having identified a Python package in PyPI that masquerades as the legitimate SDK...
Nacho Palou

Ethical IoT: principles for an implementation that respects people’s rights

IoT (Internet of Things) is one of the fundamental technologies in more and more digital transformation processes and for the development of new business opportunities. It consists of the...

Navegación de entradas

Previous articles
1 … 9 10 11 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
(re) Introducing Evil Foca (DEFCON Edition)
Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration