Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • Telefónica TECH AI Of Things
  • Eleven Paths
  • IoT
    • Success Story: achieving an audience based strategy We apply quantum technology to real use cases of Blockchain and IoT
  • Big Data
    • Artificial Intelligence vs Cognitive Computing: What’s the difference? Movies and Big Data: how to make your heart pound
  • Cybersecurity
    • Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research Move to the cloud with confidence supported by ElevenPaths and Check Point
Think Big / Business
  • Big Data & AI
    • Richard Benjamins.

      Artificial Intelligence vs Cognitive Computing: What’s the difference?

      The media hype around Artificial Intelligence (AI) and Cognitive Computing is unquestionable at the moment. They seem to appear everywhere on the Internet in the press, blogs, conferences and events...
      AI of Things

      Movies and Big Data: how to make your heart pound

      Since movie theaters were invented, there are two types of people that go there. The first group will arrive just in time for the movie, rushing to their seat...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • AI of Things

      Success Story: achieving an audience based strategy

      In our success story today, we tell you about one of our key projects in the use of Big Data to improve communication between a business and its audience,...
      AI of Things

      We apply quantum technology to real use cases of Blockchain and IoT

      Putting together Quantum Technology, Blockchain and the Internet of Things in one title seems like a formula for generating clicks. However, this is what we have done at Telefónica:...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research

      We have been for a long time researching about HSTS, HPKP, certificate pinning and TLS technologies in general. As a collateral effect of this work, we have found some...
      Move to the cloud with confidence supported by ElevenPaths and Check Point
      Pablo Alarcón Padellano

      Move to the cloud with confidence supported by ElevenPaths and Check Point

      The goal of ElevenPaths Public Cloud Managed Security Services is to help you to secure any cloud workload and to mitigate cloud risks.
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Vulnerabilities

Cyber Security Weekly Briefing February 6-12
ElevenPaths

Cyber Security Weekly Briefing February 6-12

Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and altered the...
CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)
Javier Provecho

CNCF’s Harbor (cloud native registry) fixes an information disclosure bug discovered by ElevenPaths (CVE-2020-29662)

On December 2nd, ElevenPaths’ CTO SRE team discovered an unauthenticated API within Harbor, a cloud native registry part of the CNCF. It is commonly used as an agnostic Docker...
Digital Zombies and Social Engineering
Gabriel Bergel

Digital Zombies and Social Engineering

This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you credit it, and I loved it. We...
Cyber Security Weekly Briefing 30 January - 5 February
ElevenPaths

Cyber Security Weekly Briefing 30 January – 5 February

Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is widely deployed...
Snitch Cryptography: How to Crack Tamper-Proof Devices
Gonzalo Álvarez Marañón

Snitch Cryptography: How to Crack Tamper-Proof Devices

Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation's Intranet
Amador Aparicio

CVE 2020-35710 or How Your RAS Gateway Secure Reveals Your Organisation’s Intranet

Parallels RAS (Remote Application Server) is a virtual desktop infrastructure (VDI) and application delivery solution that enables an organisation’s employees and clients to access and use applications, desktops and...
Detecting the Indicators of An Attack
Diego Samuel Espitia

Detecting the Indicators of An Attack

We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
Cyber Security Weekly Briefing January 23-29
ElevenPaths

Cyber Security Weekly Briefing January 23-29

Attack against SonicWall by exploiting a possible 0-day in its VPN appliances Firewall manufacturer SonicWall has issued a security alert warning that it has detected a sophisticated attack against...
Laboratory Information Management System (LIMS) and Its Mobile Applications
Carlos Ávila

Laboratory Information Management System (LIMS) and its Mobile Applications

For scientists and researchers, optimising time in a laboratory nowadays plays a key role in processing and delivering results. There are applications that have specialised capabilities for R&D laboratories,...
Cyber Security Weekly Briefing January 16-22
ElevenPaths

Cyber Security Weekly Briefing January 16-22

SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...

Navegación de entradas

Previous articles
1 2 3 … 12
More articles
  • AI of Things
  • ElevenPaths

Popular

cocacola
AI of Things
Coca-Cola’s use of AI to stay at the top of the drinks market
Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...
Detecting the Indicators of An Attack
Diego Samuel Espitia
Detecting the Indicators of An Attack
We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
Cyber Security Weekly Briefing January 23-29
ElevenPaths
Cyber Security Weekly Briefing January 23-29
Attack against SonicWall by exploiting a possible 0-day in its VPN appliances Firewall manufacturer SonicWall has issued a security alert warning that it has detected a sophisticated attack against...
4 Tips to Secure Your Data
ElevenPaths
4 Tips to Secure Your Data
We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
  • Telefónica TECH AI Of Things
  • Eleven Paths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility