Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes) Medical video assistance thanks to IoT
  • Big Data
    • ARTYficial Intelligence or just Artificial, can tech be creative? Big Data for Social Good: How 6 billion mobile phones are social sensors to save lives
  • Cybersecurity
    • Women’s Engineering Day: Building New Paths Keys to Implementing a 360 Corporate Digital Identity

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
José Luis Núñez Díaz

Towards a smarter supply chain

One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
identity wallets
Alexandre Maravilla

Europe’s new digital identity; sovereign identity wallets

Have you ever stopped to think about how many user accounts we have on the Internet? Bank accounts, utility providers, Social Networks, email, e-commerce, … Nowadays we handle an...
Cloud September
Telefónica Tech

What have we learned about Cloud this September?

This new course has come loaded with knowledge for the Telefónica Tech blog. Thanks to our experts, we continue to advance, on a daily basis, in our training on...
Cyber Security Briefing
Telefónica Tech

Cyber Security Weekly Briefing 2-8 October

Apache vulnerabilities actively exploited Earlier this week, Apache fixed a 0-day (CVE-2021-41773) affecting Apache HTTP servers which was actively being exploited. However, on Thursday we learned that the patch released...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
Cyber Security Weekly Briefing 25 September - 1 October
ElevenPaths

Cyber Security Weekly Briefing 25 September – 1 October

​​​​Let’s Encrypt root certificate expires (DST Root CA X3) A few days ago, Scott Helme, founder of Security Headers, highlighted the 30 September as the date when Let’s Encrypt’s root certificate, DST...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
Raúl Hernáinz Ortega

Data as a secure asset

Data Management Summit as a preamble We are approaching one of the events where Telefónica will be present, and not only present, but also participating with its best professionals. An...
Cyber Intelligence Unit
Félix Brezo Fernández

The Work of a Cyber Intelligence Unit in The Context Of Incident Response

Besides the work carried out by our colleagues in the forensic analysis, malware analysis or Threat Hunting teams, which we have reviewed in the articles in this series associated...

Navegación de entradas

Previous articles
1 … 30 31 32 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
(re) Introducing Evil Foca (DEFCON Edition)
Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration