Logo Teldat

BLOG

AI Under Attack: A Threat Evolving at the Speed of Technological Innovation

AI Under Attack: A Threat Evolving at the Speed of Technological Innovation

In 2025, Artificial Intelligence (AI) systems are not only tools for productivity, automation, and advanced analytics—they have also become new attack vectors for cybercriminals. From data manipulation to direct model exploitation, the threat landscape is evolving as rapidly as AI itself. For professionals in cybersecurity, cyberdefense, and technology consulting,...

read more
Microservices & its advantages

Microservices & its advantages

The idea behind Microservices has been with the software industry and developers for about six to seven years now, and it´s definitely a current buzz term which is being heard more and more in the industry. However, in global terms it´s a relatively simple concept. A...

read more
Emerging Low Power Technologies

Emerging Low Power Technologies

To support the further growth and development of the Internet of Things (IoT) the mobile industry is developing and standardising a new class of GSM technologies focused on IoT, which is called Low Power Wide Area (LPWA) networks. These technologies enable the new IoT...

read more
More and more people commute to work

More and more people commute to work

The number of commuters rises to record high. According to an analysis by the Federal Institute of Research on Building, Urban Affairs and Spatial Development (BBSR), the number of commuters in Germany has peaked at sixty percent, compared to 53 percent in 2000. On...

read more
Big movements in the sector

Big movements in the sector

As I have done in previous years around this time, I would like to take this opportunity to summarize some of the most important issues we have encountered in 2017. This year is proving to be a very interesting year for the telecommunications sector. First of all, the...

read more
Access to guest networks

Access to guest networks

Nowadays, all companies provide their customers with Wi-Fi in some form or another. We find it in shopping malls, airports, restaurants, offices and even on transport. It is fair to say that Wi-Fi has become a commodity. Most customers want to connect to Wi-Fi...

read more
5G: How it will change our lives

5G: How it will change our lives

The advent of 5G technology signifies the start of an even more globally connected society, a completely digital society. This technology, expected to be implemented in 2020, will change the way we interact with each other and objects, allowing us to be permanently...

read more
Power electronics in telecommunication equipment

Power electronics in telecommunication equipment

The application of power electronics to communications devices has to do with the processing of the electrical input power using semiconductor devices and reactive elements. Thus, the raw input power is processed according to a control input that conditions the output...

read more
WannaCry – Bitcoin – Crime

WannaCry – Bitcoin – Crime

The first and so far the only time I was personally involved, (or to be more precise my son who at that time was eleven years old), in a cyber-attack by ransomware was in 2012. The computer of my son was apparently blocked by the Federal Criminal Police Office due to...

read more
Dynamic DNS Update – Teldat

Dynamic DNS Update – Teldat

Nowadays, if you check the public IP address with which you access the Internet, you will find that it often changes. This is due to the chronic shortage of IPv4 addresses, which are insufficient to cover current service demands. ISPs, therefore, often assign dynamic...

read more
First SHA-1 collision

First SHA-1 collision

In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that...

read more