The attacks were triggered during the elections. In this way, Jigsaw, a technological incubator which is Google’s parent company, has released Project Shield, a free tool for DDoS protection.
Telefónica and Gradiant have presented the TEGRA cybersecurity center, which started with the vocation of situating Galicia as a relevant agent in cybersecurity.
We have utilized public documents detected in government domains, of which can be accessed by any network user, through search engines or directly on the different entities’ websites.
Rivetz Corp. and Telefónica have announces today an agreement to collaborate on the development of advanced mobile security protocols for blockchain transactions and messaging.
En mitad de la fiebre de los 2000, apareció en Filipinas este malware que tardó sólo cinco horas en propagarse por los ordenadores de toda Asia, Europa y América a través del correo electrónico.
An interview with our hacker and expert Pablo González at Cadena Ser: ‘users are falling increasingly less into the phishing tactic; only ¼ of company employees are attacked’.
Learn with our CSAs the foundations of Smart Contracts and different code audit and contract verification techniques.
Pedro Pablo Pérez: “The ecosystem of Telefónica as a digital telco, has Digital Security as one of its pillars”
An interview with our CEO, Pedro Pablo Pérez, in SIC magazine speaking about the importance of cybersecurity nowadays.
Business Insider names us as one of the top ten Spanish cybersecurity companies, in which they consider us to be the best example of innovation.
Yaiza declares that “if you do not pay for a product online, then it is clear that you are the product”
Our intelligence analysist Yaiza Rubio affirms that this field values more your ability to learn than the qualifications you may have.
The 15th edition of the SIC Awards praises the performance and contribution of the most outstanding professionals, entities and projects in the sector.
Pedro Pablo Pérez, CEO at ElevenPaths, talks about the importance of a good implementation of the GDPR
“The oil of the 21st century is the data: we have to guarantee that we have a regulation that allows us to progress.”
“Common sense is fundamental when you browse the web”
The integration will make it possible for clients to use their mobile numbers as a secure means of authentication when accessing their online services without having to use an username and password.
Vimeo speaks with our hacker and expert Pablo González, so that he can respond to the questions about hackers and cybersecurity which we most frequently want to ask.
The second webinar available of this new season in which the expert Fran Ramírez will analyze the interconnections between isolated teams which are created via USB devices. Press play!
For the third year in a row, we will be participating in the RSA Conference, the world-leading information security event
From April 16-20 we will demonstrate all our advances in global cyber-resilient operations.
Yaiza Rubio: We put ourselves in the criminals’ shoes in order to learn and identify their techniques.
The intelligence analysist and #mujerhacker (womanhacker) highlights that there is not a specific degree on cybersecurity and hacking at university.
“They are people who have already been attacked and those who still do not know”. Pablo prefers to differentiate between hackers, “as those who are passionate for technology” and those who are technological criminals.
Members to share cyber risk intelligence and security capabilities to protect enterprises from evolving cyber threats worldwide.
The denial of service attacks is a worry for both any public entity and business organization whose business processes are network-based. During this #11PathsTalk, we will talk about the different attack techniques and the defense strategies which they use.
Here is a list of the events, conferences and courses in which we are participating in this month worldwide.
“Cybercrime costs the global economy 600 billion dollars which has an impact of more than 1% of the GDP from the world’s major economies”
Evrial’s new tecnical research, the malware designed to steal Bitcoins through the clipboard and sell it on the black market.
Since 2011, HITEC has compiled a comprehensive list featuring the top 50 most influential and notable professionals in the technology industry in Latin America/Ibero-America called the “HITEC 50“. We are proud of our CEO.
Watch thi webinar in which we present a proyecto that was created in order to implement Latch as a extra security layer in a Coinbase cryptocurrency wallet.
Don’t miss out on the interview with our intelligence analyst Yaiza Rubio on TVE’s “Aquí hay trabajo” program. Starting in the minute 7.46.
The certificate registry which contains a history of the usage, validity periods and expiration dates, actually offers an apt data set suitable for different data mining processes.
During the Madrid Woman’s Week event, the intelligent analyst Yaiza Rubio, and the Chairman, Chema Alonso, have made several statements about equality between women and men.
Learn with our CSA Manager, Rames Sarwat, and a special guest, Dr. Alfonso, a reputed cryptography expert, to understand the state-of-the-art quantum technology and its expected evolution in the coming years. Do not miss it!
The developer, Javier Espinosa, explains how easy it is to integrate Latch’s security in applications. Go to the community and speak with our experts about your doubts and suggestions.
Evrial is a cryptocoin malware stealer discovered by our researchers which takes control of the clipboard to get “easy money”.
In this first #CodeTalks4Devs Additional webinar, the expert, Ioseba Palop explains to us how to integrate Latch in the .NET platform.
Telefónica partners with McAfee to protect customer devices embedding its technology in the home Internet routers
Telefónica and McAfee have announced an agreement to reinforce the online security for Telefónica’s broadband and mobile customers across its markets in Europe and Latin America.
For Woman International Day, Open Data Security has interview our informatic security analyst Sheila A. Berta. She, with only 22 years, has managed to conquer this field in a self-taught way.
We bring you the last three episodes of the first Code Talks for Devs season. We will dig into the different integrations of Latch on NET., JAVA y PHP platforms with our experts.
Don´t miss Pablo San Emeterio’s interview , one of our experts and Chief Security Ambassador, who talks about about what cybersecurity is and the risks of the internet, among others.
UAC-A-Mola is a framework, designed to investigate, detect, explore and mitigate the weaknesses called UAC bypass. These weaknesses are found in Microsoft Window operating systems.
The Malaga mayor, Francisco de la Torre, and Telefónica’s Territorio Sur director, María Jesús Almazor, have presented this Monday the activities that will take place during the next months at Telefónica’s Promalaga Urbanlab-Espacio.
UAC-A-Mola, new framework designed for researching, detecting, exploiting and solving UAC bypass weaknesses
UAC-A-Mola allows automatizing the detection of a UAC bypass in a computer with Windows 7/8/8.1/10. This new tool can run customizable modules that allow automatizing researching looking for UAC.
During 2016 the UK cost of cybercrime was estimated at around £29 billion and in 2017 we saw a 22% growth on that figure. Here are three recommendations to keep your organisation secure.
Intelligence analyst Félix Brezo mentions that, unlike the euro or the dollar, legal currencies issued by a central bank, cryptocoins follow a “decentralized philosophy”.
In this webinar, Javier Alcaraz tells us his Final Degree project in which he explains how to integrate our Latch technology into devices, like the router, to cope with the cyber threats of the network.
One of our hacker womens and developer, Carmen Torrano, will introduce a case study based on the analysis of algorithms applied to Machine Learning.
With his team of hacker, Sergio de los Santos runs our Innovation Lab in Malaga. He has followed the clues to Bin Laden and discovered many things.
Don’t miss out the interview of the first spanish hacker participating in the most important cybersecurity conference of the world.
With the elections in Catalonia just around the corner, our expert, Pablo San Emeterio, affirms that any electronic device connected to the Internet can be a victim of a cyberattack.
Álvaro Núñez-Romero, one of our ElevenPaths experts, show us in this webinar how to apply Latch to the physical world through a small microcontroller.
Diario Sur dedicates this article to our Innovation and Laboratory team, who is in charge of exploring the future of computer security and testing improvements for all Telefónica Digital products and services.
Did you miss #CodeTalks4Devs about Latch Cloud TOTP in NodeJS and .NET? Our programmer experts, Carlos del Prado and Ioseba Palop, teach you how manage the TOTP tokens as 2FA. Connect to the webinar!
Don’t miss out this Thursday at 3.30pm (CET) in our YouTube channel the webinar about steganography techniques and tools to find out the hidden information in several formats and protocols. Take note!
Our Innovation and Laboratory director, Sergio de los Santos, said that recognition and voice processing has been among us for a long time, any application can process what is being said. Go to ‘El Confidencial’ and learn about it!
Our security researcher, Sergio de los Santos, said that whilst Google has patented technology to improve detection of rogue apps, the fraudsters have found new ways to get their software on the official market. Know more about it!
Our team of analysts have identified a new threat actor called Maksim that develops malware for Android devices. It has been attributed with the distribution of numerous malicious applications through various websites for purely economic purposes. Download the report!
Learn with our experts Álvaro Núñez-Romero and Pablo González how to created your own DirtyTooth in a Raspberry Pi thanks to the basic installation package that we have developed in our inovation lab. Don´t miss it!
Learn in this webinar with our CSAs Jorge Rivera and Rames Sarwat, together with a special guest, about managed security and the evolution to the concept of Intelligent MSSPs. Don’t miss it!
We explain how to detect a sucession of events, not necessarily security related, giving hints to consider a Windows Machine jeopardized, using for that purpose Security Monitoring product. Check it out!
Don’t miss out the interview with our CEO Pedro Pablo Pérez, and Juan Antonio Gómez Bule, president of Walhalla Datacenter Services in Forbes magazine. They talk about the cyber attacks that we are currently suffering. Access to the full interview
Thanks to the information provided by BitSight, we presented this study which aim is based on showing the state of cybersecurity in Spanish companies but also those companies which are included in the IBEX 35. Download here!