Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Safer, but not immune Worker’s Diary IoT III
  • Big Data
    • How has the NFL Super Bowl evolved with the introduction of Big Data? Humanities in a Big Data World
  • Cybersecurity
    • Will Rust save the world? (II) Analysis of APPs Related to COVID19 Using Tacyt (I)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Sin categoría

Florence Broderick

ElevenPaths is now a NoMoreRansom.org associated partner

Ransomware has a severe impact for IT companies and users. The increasing popularity of this security threat along with the profitable business for criminals make ransomware one of the...
Ana Zamora

Hackathons are not just for developers

By Glyn Povah, Head of Global Product Development at LUCA. Hackathon is derived from the English words “hack” and “marathon”, and if you Google the word “hackathon” you’ll get something...
ElevenPaths

ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency

Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
AI of Things

4 times Big Data invaded the world of Fashion

The relationship between Big Data and Fashion stems back to 2013 when giants like ASOS and Gap started to use data to enhance their customer shopping experience – revolutionizing the way consumers buy garments online. 1. Chanel’s Data...
AI of Things

The 6 data-driven pioneers of politics

Data is starting to change the way we run our world, and businesses have tended to lead the adoption and application of Big Data technology. Nevertheless, there are some...
Florence Broderick

ElevenPaths and iLife Security signed an agreement for implementing services in support, IT management and security

Aiming to help clients to adapt their systems in this new technological reality and its growing challenges in security matters, ElevenPaths and iLife Security, company specialized in Full Outsorcing...
AI of Things

MWC Day 4: Understanding road safety with Open and Mobile Data

It’s day 4 of Mobile World Congress here in Barcelona and the experience is coming to an end. As we mentioned yesterday, we’re sharing a video each day on our blog...
Florence Broderick

ElevenPaths and Opencloud Factory signed an agreement to provide a unique solution for access control in corporative networks

ElevenPaths and Opencloud Factory signed a technological agreement, aiming to develop a unique solution for controlling the access in corporative networks. Thanks to this agreement, Mobile Connect...
AI of Things

MWC Day 2: Our data-driven approach to Commuting and Pollution

It’s the second day of Mobile World Congress here in Barcelona and one of the demos we’re focusing on today looks at the intriguing relationship between commuting and pollution. In this data...
Florence Broderick

MWC Day 2: Our partnership with UNICEF to boost Big Data for Social Good

Today we are proud to announce our latest collaboration with UNICEF through their Magic Box initiative – a Big Data for Social Good platform which collects real-time data,...

Navegación de entradas

Previous articles
1 … 15 16 17 … 34
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration