Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 ways the IoT is helping the Environment Farms 4.0: IoT to benefit agriculture
  • Big Data
    • Can Big Data and IOT prevent motorcycle crashes? Telefónica Tech at the top of the IoT and Big Data podium
  • Cybersecurity
    • How Lokibot, the malware used by Machete to steal information and login credentials, works Cyber Security Weekly Briefing May 1-7
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

David García

Senior Security Analyst at the Innovation and Laboratory Area at ElevenPaths.



David García

Will Rust save the world? (II)

We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
David García

Will Rust save the world? (I)

How Rust, the security-focused open source programming language, improves the outlook for memory error-based vulnerabilities
Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
Malware Go
David García

The Malware Created in Go Is A Trend And Is Here To Stay

Even though it cannot be said that Go is a new programming language (it is already more than ten years old), it does belong to that new batch of...
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration