Close panel

Close panel

Close panel

Close panel

Internet

04 Jul 2019

In the business world, the CISO or Chief Information Security Officer is the person responsible for ensuring and upgrading information security within the organization. At home, we can apply many of the basic principles that are foundation of the CISO role to protect and preserve our family’s private information. No matter how daunting the task may seem at first, it is really not that hard to achieve this goal without being an expert on the subject.

01 Jul 2019

24 May 2019

21 Feb 2019

18 Feb 2019

08 Feb 2019

Social networks and the conversation created by the media on the internet provide a reliable source of information to gauge society’s feelings or perceptions on certain topics. In a new report, BBVA Research applies big data and artificial intelligence techniques to analyze the reach, the topics, the key players and the perception of the fintech phenomenon based on the information published on Twitter and traditional media.

30 Jan 2019

28 Jan 2019

10 Jan 2019

texto foto

The 49th World Economic Forum, known as the Davos Forum, is set to begin on January 22 in the Swiss district of Davos-Klosters. For four days politicians, businessmen, and representatives from social and cultural organizations will gather to discuss global problems and identify solutions. This year, the forum will place special emphasis on international collaboration, giving the world a voice.

14 Dec 2018

30 Nov 2018

16 Nov 2018

The market for influencers is in full expansion mode. This trend has proven to be an opportunity not only for the influencers themselves – or those who aspire to become one – but also for companies that see an opportunity to promote their products or services.

26 Oct 2018

23 Oct 2018

22 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

21 Oct 2018

20 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

19 Oct 2018

18 Oct 2018

17 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

02 Oct 2018

14 Sep 2018

If our digital identities are only guided by the recommendations fed by an artificial intelligence, we risk creating a virtual world with polarized opinions.

04 Sep 2018

03 Sep 2018

Summer has come to an end, and the usual back-to-school season gets underway. It’s the time of the year to prepare school supplies, and it can also be a good time to take stock of our digital habits to be sure to start the year safely on the right foot:

10 Aug 2018

06 Aug 2018

24 Jul 2018

There’s a fix for confusing economic terms or not being up-to-date with financial news: “influencers” aren’t just gamers or it-girls; many experts in the finance domain use the virtual world to provide information, data, and opinions about financial and economic topics.

18 Jul 2018

06 Jul 2018

Technology changes our lives day by day, offering us capabilities that were unimaginable just yesterday, but also complex challenges and potentially frightening conflicts. In other words: the perfect raw material for the best TV comedy and drama, which has found fertile ground in anti-establishment hackers, genius programmers, start-ups in distress, indolent IT guys or dystopian visions that seem a little too much like the world we live in.

05 Jul 2018

Digitalization encompasses both a process and a habitat. As a process, digitization transforms analogue content. For example, converting the 1604 edition of ‘Quijote’ printed by Juan de la Cuesta into a digital ‘Quijote’. The content that was drawn, printed, or typed is input into a computer via numeric codes. The result can even simulate the original typography. But the letters that appear on the screen are, in reality, digits that the computer converts into images.

25 Jun 2018

Where do most internet users go online from? What devices do they use? How often do they upgrade their smartphones? This a snapshot of the current internet and smartphone use habits across the planet.

04 Jun 2018

28 May 2018

Virtually everybody today has a username and password. We are required to provide them to log on to popular online services, including social media, online stores and streaming services. By default, browsers will ask you if you want to save passwords to save you the trouble of typing them again. If you are inclined to answer ‘yes’, keep reading because you’ll find this information of use.

21 May 2018

Throughout history, there have been several versions of the family and different models of relating with one another. The latest version is the family 2.0.

Generation T refers to those born from 2010 onwards. These are children who know the world through a digital screen and what is more important through touch. Hyperconnectivity, speed and instantaneousness are some of the words that go along with these children as they grow up.

16 May 2018

New modes of communication have transformed the way news is delivered. Thanks to the Internet, access to information has never been so fast. Each minute more than 3.5 million Google searches are made, Facebook is accessed 900,000 times, and 156 million emails are sent. The compulsion to be informed every minute of the day has provoked a surge in so-called “fake news.”

16 Apr 2018

Malware, or malicious software, covers different programs which, when run in devices, cause different types of damage and complications such as interrupting their operations, disrupting how they work, stealing information and displaying unwanted advertising.

02 Apr 2018

28 Mar 2018

27 Mar 2018

That surfing on the internet means leaving a trail of personal information is nothing new. Browsers gather preferences and habits thanks to the cookies installed in computers when surfing.

23 Mar 2018

21 Mar 2018

14 Mar 2018

07 Mar 2018

There is no greater source of pride in the world than to see our children get ahead in life. Their achievements, their charms… It can be marvelous to share each moment of their progress with family members, friends and work colleagues. But is it a good idea to do so on social networks? Is this the right place to share this information?

05 Mar 2018

02 Mar 2018

BBVA’s drive towards delivering a world class digital banking experience has taken another step forward. Over the past year the bank has seen an almost twofold year on year increase in the number of products and services its customers and clients are taking-up via digital channels.

28 Feb 2018

Digital identity is the online version of an individual’s physical identity.  It consists of all of the individual´s personal data that is available online —not just an email or physical address, but also pictures, banking info, shopping preferences. This identity is not uniform, as we share different attributes in different platforms. In other words, we don’t share the same type of information on LinkedIn and Facebook, for example.

27 Feb 2018

16 Feb 2018

The widespread use of mobile devices on a day-to-day basis brings with it the risk of very personal information such as bank details, photographs, messages, contacts and emails and a long list of private details falling into unwanted hands.