The CSA Fabián Chiera declares that blockchain is not a technology that is going to change many things, it has already changed them but we don´t know all these changes.
The Innovation and Lab team creates this new tool that provides protection for your bitcoin transactions from malware.
The Technology Park of Andalucia holds a summer course with a workshop to create a blockchain with our expert speaker Marcos Arjona.
Two of the members of the Telco Security Alliance, Etisalat and Telefonica detect similar malware and are willing to provide CyberSecurity Threat advisory to protect critical information from Cyber Threats.
Tegra, the first cybersecurity centre in Spain that we promote together with Gradiant and the Xunta of Galicia, creates the first project called Irmas (Information right management advanced systems).
Youtuber Nikolas Fischman interviews our CSA Manager Claudio Caracciolo. Access the link and learn the main guidelines on cybersecurity.
The expert states that companies are currently going to increase their cybersecurity budget by more than 25% in the coming years.
Paper about “UAC Bypass & Research with UAC-A-Mola” written by our experts Pablo González and Santiago Hernández has been published at Exploit DataBase.
Paper about “Discovering and Plotting Hidden Networks created with USB Devices” written by our Chairman Chema Alonso, and Pablo González, Carmen Torrano and Fran Ramírez experts has been published at Exploit DataBase.
Ever since she was very young, this woman knew that her future would be technology, even though she was a reference in the world of sports when she was very young.
Springer Ref publishes its encyclopedia about “Social Network Analysis and Mining” in which our colleagues Sergio de los Santos, Antonio Guzmán and Carmen Torrano collaborate with a case study on the detection of fraud through malware patterns in Android.
Our Chairman Chema Alonso, Global Chief Digital Security Officer at Telefónica, Alejandro Ramos, and CDO, expert Pablo González Pérez, in the top 25 influencers in cybersecurity during the IDG Security Day event.
According to Yaiza, “hackers are dedicated to finding flaws in security and trying to stop the software from being vulnerable so that people have better security”.
Vicente Segura, Head of IoT Security at Telefónica, said that “Mobile operators can help protect IoT networks by developing a security model which can be adapted to specific verticals”.
The objective of this alliance is to Provides Telefónica customers advanced cybersecurity monitoring and protection service through Devo Data Operation Platform.
Read the full interview to our hacker Yaiza Rubio and get to know her more closely. She talks about her professional career and personal anecdotes.
Claudio Caracciolo, CSA Manager, explains that security attacks are usually random. The victim is chosen based on what he does wrong or the insecure services to which he connects.
Chema Alonso, CDO of Telefónica and Chairman of ElevenPaths, affirms that “the data is good”, during the celebration of the fourth session about Digital Transformation.
Dinoflux joins its portfolio of leading companies for the massive analysis of malware and generation of real-time threat intelligence and sampling of IoT (IoT Anomaly Detection) products.
ElevenPaths further strengthens its reputation as a cybersecurity services provider during the V edition of Security Day
Telefónica continues to establish itself as an Intelligent MSSP to offer end-to-end cyber-resilient solutions to all its clients and to provide greater security to organizations in all aspects of their day-to-day operations.
Telefónica and Gradiant have presented the TEGRA cybersecurity center, which started with the vocation of situating Galicia as a relevant agent in cybersecurity.
We have utilized public documents detected in government domains, of which can be accessed by any network user, through search engines or directly on the different entities’ websites.
Rivetz Corp. and Telefónica have announces today an agreement to collaborate on the development of advanced mobile security protocols for blockchain transactions and messaging.
En mitad de la fiebre de los 2000, apareció en Filipinas este malware que tardó sólo cinco horas en propagarse por los ordenadores de toda Asia, Europa y América a través del correo electrónico.
Learn with our CSAs the foundations of Smart Contracts and different code audit and contract verification techniques.
Pedro Pablo Pérez: “The ecosystem of Telefónica as a digital telco, has Digital Security as one of its pillars”
An interview with our CEO, Pedro Pablo Pérez, in SIC magazine speaking about the importance of cybersecurity nowadays.
An interview with our hacker and expert Pablo González at Cadena Ser: ‘users are falling increasingly less into the phishing tactic; only ¼ of company employees are attacked’.
Business Insider names us as one of the top ten Spanish cybersecurity companies, in which they consider us to be the best example of innovation.
Yaiza declares that “if you do not pay for a product online, then it is clear that you are the product”
Our intelligence analysist Yaiza Rubio affirms that this field values more your ability to learn than the qualifications you may have.
The 15th edition of the SIC Awards praises the performance and contribution of the most outstanding professionals, entities and projects in the sector.
Pedro Pablo Pérez, CEO at ElevenPaths, talks about the importance of a good implementation of the GDPR
“The oil of the 21st century is the data: we have to guarantee that we have a regulation that allows us to progress.”
“Common sense is fundamental when you browse the web”
The integration will make it possible for clients to use their mobile numbers as a secure means of authentication when accessing their online services without having to use an username and password.
The second webinar available of this new season in which the expert Fran Ramírez will analyze the interconnections between isolated teams which are created via USB devices. Press play!
Vimeo speaks with our hacker and expert Pablo González, so that he can respond to the questions about hackers and cybersecurity which we most frequently want to ask.
For the third year in a row, we will be participating in the RSA Conference, the world-leading information security event
From April 16-20 we will demonstrate all our advances in global cyber-resilient operations.
Yaiza Rubio: We put ourselves in the criminals’ shoes in order to learn and identify their techniques.
The intelligence analysist and #mujerhacker (womanhacker) highlights that there is not a specific degree on cybersecurity and hacking at university.
“They are people who have already been attacked and those who still do not know”. Pablo prefers to differentiate between hackers, “as those who are passionate for technology” and those who are technological criminals.
The denial of service attacks is a worry for both any public entity and business organization whose business processes are network-based. During this #11PathsTalk, we will talk about the different attack techniques and the defense strategies which they use.
Members to share cyber risk intelligence and security capabilities to protect enterprises from evolving cyber threats worldwide.
Here is a list of the events, conferences and courses in which we are participating in this month worldwide.
“Cybercrime costs the global economy 600 billion dollars which has an impact of more than 1% of the GDP from the world’s major economies”
Evrial’s new tecnical research, the malware designed to steal Bitcoins through the clipboard and sell it on the black market.
Since 2011, HITEC has compiled a comprehensive list featuring the top 50 most influential and notable professionals in the technology industry in Latin America/Ibero-America called the “HITEC 50“. We are proud of our CEO.
Watch thi webinar in which we present a proyecto that was created in order to implement Latch as a extra security layer in a Coinbase cryptocurrency wallet.
Don’t miss out on the interview with our intelligence analyst Yaiza Rubio on TVE’s “Aquí hay trabajo” program. Starting in the minute 7.46.
The certificate registry which contains a history of the usage, validity periods and expiration dates, actually offers an apt data set suitable for different data mining processes.
During the Madrid Woman’s Week event, the intelligent analyst Yaiza Rubio, and the Chairman, Chema Alonso, have made several statements about equality between women and men.
Learn with our CSA Manager, Rames Sarwat, and a special guest, Dr. Alfonso, a reputed cryptography expert, to understand the state-of-the-art quantum technology and its expected evolution in the coming years. Do not miss it!
The developer, Javier Espinosa, explains how easy it is to integrate Latch’s security in applications. Go to the community and speak with our experts about your doubts and suggestions.
Evrial is a cryptocoin malware stealer discovered by our researchers which takes control of the clipboard to get “easy money”.
In this first #CodeTalks4Devs Additional webinar, the expert, Ioseba Palop explains to us how to integrate Latch in the .NET platform.
Telefónica partners with McAfee to protect customer devices embedding its technology in the home Internet routers
Telefónica and McAfee have announced an agreement to reinforce the online security for Telefónica’s broadband and mobile customers across its markets in Europe and Latin America.
For Woman International Day, Open Data Security has interview our informatic security analyst Sheila A. Berta. She, with only 22 years, has managed to conquer this field in a self-taught way.
We bring you the last three episodes of the first Code Talks for Devs season. We will dig into the different integrations of Latch on NET., JAVA y PHP platforms with our experts.
Don´t miss Pablo San Emeterio’s interview , one of our experts and Chief Security Ambassador, who talks about about what cybersecurity is and the risks of the internet, among others.
UAC-A-Mola is a framework, designed to investigate, detect, explore and mitigate the weaknesses called UAC bypass. These weaknesses are found in Microsoft Window operating systems.
The Malaga mayor, Francisco de la Torre, and Telefónica’s Territorio Sur director, María Jesús Almazor, have presented this Monday the activities that will take place during the next months at Telefónica’s Promalaga Urbanlab-Espacio.
UAC-A-Mola, new framework designed for researching, detecting, exploiting and solving UAC bypass weaknesses
UAC-A-Mola allows automatizing the detection of a UAC bypass in a computer with Windows 7/8/8.1/10. This new tool can run customizable modules that allow automatizing researching looking for UAC.
During 2016 the UK cost of cybercrime was estimated at around £29 billion and in 2017 we saw a 22% growth on that figure. Here are three recommendations to keep your organisation secure.
Intelligence analyst Félix Brezo mentions that, unlike the euro or the dollar, legal currencies issued by a central bank, cryptocoins follow a “decentralized philosophy”.
In this webinar, Javier Alcaraz tells us his Final Degree project in which he explains how to integrate our Latch technology into devices, like the router, to cope with the cyber threats of the network.
One of our hacker womens and developer, Carmen Torrano, will introduce a case study based on the analysis of algorithms applied to Machine Learning.