Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Sweet dreams with IoT AI of Things (XI) Preventive maintenance on sensors: anticipating sensor failures, predicting battery replacement
  • Big Data
    • Our 5 Favorite Free Data Courses How to learn Python: the most important skill for employers
  • Cybersecurity
    • Our participation in DES 2023, the leading event on trends and digitalization PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Sin categoría

Telefónica Tech

Cyber Security Weekly Briefing, 22 – 28 April

SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
Photo: Markus Winkler / Unsplash
Marta Mallavibarrena

Artificial intelligence: making fake news more real

Fake News, the word of the year 2017 according to the Collins dictionary and repeated endlessly both in the media and on social networks. We have even dedicated numerous...
Person working with a computer
Telefónica Tech

Cyber Security Weekly Briefing, 13–20 May

VMware fixes critical vulnerabilities in several of its products VMware has issued a security advisory to fix a critical authentication bypass vulnerability affecting several of its products. Identified as CVE-2022-22972...
Woman shoping in a mall
Mariano Banzo Martínez

AI of Things (IV): You can already maximise the impact of your campaigns in the physical space

Knowledge of customer profiles and the environment thanks to technology and big data makes possible to have an impact on the business
María Teresa Nieto Galán

Facts and lies about the famous concept of NFTs

The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
shopping " securely " on the Internet
Martiniano Mallavibarrena

Are we really shopping ” securely ” on the Internet?

Once Black Friday, Singles’ Day (if you have Chinese roots or any kind of relationship to it) and Christmas are over, I’m sure the vast majority of us have...
Telefónica Tech

Cyber Security Weekly Briefing 11 – 17 December

New campaign distributing the Anubis banking trojan Researchers at Lookout have reported a malicious campaign distributing a new version of the Anubis banking trojan obfuscated in an Android mobile app...
Rocío Muñoz Paul

The TALENT NETWORK moment at Telefónica Technology & Automation LAB

The Telefónica Technology and Automation Laboratory has not stopped in its first five months of life since its relocation to the Distrito Telefónica. So far, we have announced how the...
Cristina del Carmen Arroyo Siruela

Monitoring technologies, a key element in cyber security

IDS (Intrusion Detection System), IPS (Intrusion Prevention System) and SIEM solutions are fundamental elements in event monitoring and cybersecurity. IDSs and IPSs are intrusion detection and prevention systems that employ...
IoT, Big Data and AI convergence report
Telefónica Tech

IoT, Big Data and AI convergence report

The IoT and Smart Cities Cybersecurity Innovation Centre of Telefónica Tech Ciber Security & Cloud in Valencia, Spain, brings us a compilation of the potential risks related to IoT,...

Navegación de entradas

Volver a portada
1 2 … 34
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration