Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Advances of Industria 4.0 and its impact on society Programming languages in the IoT era
  • Big Data
    • Meet our LUCA team in Brazil Big Data and IoT in tennis, serving up new insights
  • Cybersecurity
    • #CyberSecurityPulse: Biggest-Ever DDoS Attack Hits Github Website Cybersecurity: “black swan“ events in a connected world
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Sin categoría

Florence Broderick

ElevenPaths discovers the Popcorn ransomware passwords: no need to infect other people to decrypt for free

MalwareHunterTeam has discovered a new variant of ransomware that is quite curious. At ElevenPaths we have been able to download and analyze the new improved versions that make several...
Florence Broderick

Latch Plugins Contest 2016 is over

Today, Monday, December 12 at 1 pm (CET), was the deadline for the submission of plugin applications to the Latch Plugins Contest, the Latch contest that looks for innovative...
Florence Broderick

You can still win 5000 dollars. Send your Latch plugins over!

Remember that on Monday, December 12 at 1pm (CET), the deadline for the submission of applications for our Latch plugins competition ends. You’ve had almost two months to think...
Florence Broderick

Telefónica Mannequin Challenge

Today in the office we decided to do our very own Mannequin Challenge, bringing together employees from all over Telefónica. This viral internet craze has even frozen the internet...
Florence Broderick

Take part in Latch Plugins Contest with such hacks as Paper Key. Are you game?

At Elevenpaths there is a tradition of developing innovation and training the ability to transform an idea into something tangible, as you might know that in development process, projects...
Beatriz Sanz Baños

Industry 4.0 is much more than Smart Factories

We should start by explaining what Industrial IoT (IIoT) – also known as Industry 4.0 – is. It is undoubtedly as much a revolution as the three previous revolutions...
Florence Broderick

Big Dating: Could AI be the real matchmaker on Tinder?

Online dating platforms such as Tinder, Happn and Hinge are seeing exponential growth, slowly sliding on to the home screens of smartphone users all over the world.  Last week...
Florence Broderick

ElevenPaths and Etisalat Digital announce their collaboration for Mobile Security R&D

Madrid, November 21 2016.– ElevenPaths, Telefónica Cyber Security Unit, and Etisalat Digital, two of the world’s leading providers of communications services and solutions, announced today their collaboration in the...
Florence Broderick

The Data Transparency Lab Conference 2016 kicks off tomorrow

By Ramon Sangüesa, Data Transparency Lab coordinator. p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 13.3px Tahoma; -webkit-text-stroke: #000000} span.s1 {font-kerning: none} This week the 2016 edition of the Data Transparency Lab conference...
Florence Broderick

Cryptographic Security in IoT (III)

The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...

Navegación de entradas

Previous articles
1 … 18 19 20 … 34
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration