Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • “The client seeks to live a different experience with each purchase” Park your car with IoT
  • Big Data
    • Success Story: Using Big Data to improve Tourism with Iberostar DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology
  • Cybersecurity
    • What Little Red Riding Hood teaches us about cyber security AMSI, one step further from Windows malware detection
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Sin categoría

AI of Things

Whatsapp is down, now what?

Written by Raúl López and Luis Suárez, LUCA interns. Very few people use their mobile phones without installing Whatsapp. The application gives thousands of millions of people the possibility to...
ElevenPaths

Security Day 2017_ Cyber Security beats

Sign up! The motto of the fourth edition of our Security Day is Cybersecurity Beats. A conference about security and technology where this year we will teach how our security...
AI of Things

Big Data has even reached Las Fallas in Valencia

Just a few months ago, the capital of the Valencian community hosted the biggest party of the year: Las Fallas de Valencia. Every year from the 15th until the...
ElevenPaths

Mum, I want to be a hacker

The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths

ElevenPaths and the University of Piraeus in Greece work together using Tacyt as an educational and research unit

ElevenPaths and the Department of Informatics of the University of Piraeus in Greece work together using Tacyt as an educational and research unit. ElevenPaths and the Department of Informatics of...
AI of Things

How much do London firefighters spend on saving helpless kittens? The Open Data answers

Original post in Spanish by Paloma Recuerdo In this second post, a continuation of “Smart Cities: Squeezing Open Data with Power BI”, we will analyse the problem and understand the measures...
ElevenPaths

Squeezing the numbers and facts of Google’s annual Android security report

Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Richard Benjamins

Artificial Intelligence is disrupting the law as we know it

Years ago, science fiction movies used to seem very futuristic to us – making us feel detached from the remarkable innovations we saw from scene to scene.  However, what...
ElevenPaths

Latch and IoT, a perfect symbiosis

The Internet of Things stopped being the future to become our present. It’s rare that on any given day we do not interact in one way or another with...
ElevenPaths

Limiting the use scope of our secrets in Latch with “Limited Secrets”

When creating a Latch app as a developer, Latch provides us with an application identifier (appId) and a secret. These two keys allow us to sign the requests sent...

Navegación de entradas

Previous articles
1 … 14 15 16 … 34
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration