Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT to save the environment How process automation can help your business
  • Big Data
    • #LanzamosLUCA: Dave Sweeney on using Mobile Data to disrupt Transport and Tourism LUCA and the UN World Data Forum: 7 ways mobile data is being used to change the world
  • Cybersecurity
    • Do I Really Need an Antivirus? New tool: SKrYPtEd, your Skype conversations local database protector
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Vulnerabilities

Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.
Bestiary of a Poorly Managed Memory (I)
David García

Bestiary of a Poorly Managed Memory (I)

WannaCry, EternalBlue, Conficker... their cyber attacks have one thing in common: the arbitrary code execution. Discover how they happen.
What Kind of Professionals Work in Our Security Operations Center (SOC)?
ElevenPaths

What Kind of Professionals Work in Our Security Operations Center (SOC)?

Discover the different profiles of the SOC professionals in this post, who work day and night to provide the best security to our customers.
Risk Analysis Applied to COVID-19
Gabriel Bergel

Risk Analysis Applied to COVID-19

Our CSA Gabriel Bergel shows you how to apply the Risk Analysis methodology to the management of the COVID-19 threat.
COVID-19: Risk Guide and Recommendations on Cyber Security
SCC CyberThreats Service

COVID-19: Risk Guide and Recommendations on Cyber Security

From the point of view of cyber security, the current situation caused by the coronavirus is also particularly worrying. Users and companies are being threatened. From the Telefonica’s SCC...
How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus
ElevenPaths

How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus

The overinformation caused by the huge amount of news we receive about coronavirus makes it harder to distinguish true from fake emails. This poses a great risk to people’s security, since it...
Cybersecurity Trends Report for 2020 from ElevenPaths
ElevenPaths

Cybersecurity Trends Report for 2020 from ElevenPaths

Discover the technologies and attacks that will most affect security in the coming months in this report.
Secure Telework, Applying Cybersecurity from Home
Andrés Naranjo

Secure Homeworking, Applying Cybersecurity from Home

Working from home makes it easier to reconcile these difficult days, but safety should not be overlooked. Telework safely with these tips.
Trend Report: Hacktivist CyberThreats Report 2019
ElevenPaths

Trend Report: Hacktivist CyberThreats Report 2019

An analytical report that includes the periodic scanning of the hacktivist threat’s behavior in five observation rings: Europe and the United Kingdom, North America, Latin America, MENA / Asia...

Navegación de entradas

Previous articles
1 … 19 20 21 … 23
More articles
  • Telefónica Tech

Popular

ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Florence Broderick
Responsible full disclosure… por ambas partes
La revelación responsable de vulnerabilidades es un viejo debate, pero no necesariamente zanjado. Vamos a observarlo desde el punto de vista del sistema vulnerable o afectado, no desde el...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration