Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The era of a connected society When will Robots find a place in the Smart Home?
  • Big Data
    • Groundbreaking study exposes the extent of UK gender bias Is your AI system discriminating without knowing it?: The paradox between fairness and privacy
  • Cybersecurity
    • Cyber Security Weekly Briefing 31 July-13 August ElevenPaths Radio English #4 – Privacy and Personal Data Protection
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Sin categoría

Telefónica Tech

Cyber Security Weekly Briefing, 22 – 28 April

SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
Photo: Markus Winkler / Unsplash
Marta Mallavibarrena

Artificial intelligence: making fake news more real

Fake News, the word of the year 2017 according to the Collins dictionary and repeated endlessly both in the media and on social networks. We have even dedicated numerous...
Person working with a computer
Telefónica Tech

Cyber Security Weekly Briefing, 13–20 May

VMware fixes critical vulnerabilities in several of its products VMware has issued a security advisory to fix a critical authentication bypass vulnerability affecting several of its products. Identified as CVE-2022-22972...
Woman shoping in a mall
Mariano Banzo Martínez

AI of Things (IV): You can already maximise the impact of your campaigns in the physical space

Knowledge of customer profiles and the environment thanks to technology and big data makes possible to have an impact on the business
María Teresa Nieto Galán

Facts and lies about the famous concept of NFTs

The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
shopping " securely " on the Internet
Martiniano Mallavibarrena

Are we really shopping ” securely ” on the Internet?

Once Black Friday, Singles’ Day (if you have Chinese roots or any kind of relationship to it) and Christmas are over, I’m sure the vast majority of us have...
Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
Rocío Muñoz Paul

The TALENT NETWORK moment at Telefónica Technology & Automation LAB

The Telefónica Technology and Automation Laboratory has not stopped in its first five months of life since its relocation to the Distrito Telefónica. So far, we have announced how the...
Cristina del Carmen Arroyo Siruela

Monitoring technologies, a key element in cyber security

IDS (Intrusion Detection System), IPS (Intrusion Prevention System) and SIEM solutions are fundamental elements in event monitoring and cybersecurity. IDSs and IPSs are intrusion detection and prevention systems that employ...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...

Navegación de entradas

Volver a portada
1 2 … 34
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration