Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence: a companion to fight loneliness 5 ways the IoT is helping the Environment
  • Big Data
    • 5 medical uses of Virtual Reality AI Augmented Reality, powering the online shopping experience
  • Cybersecurity
    • When Preventing a Cyberattack Becomes a Vital Decision Digital Zombies and Social Engineering
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

David García

Senior Security Analyst at the Innovation and Laboratory Area at ElevenPaths.



David García

Will Rust save the world? (II)

We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
David García

Will Rust save the world? (I)

How Rust, the security-focused open source programming language, improves the outlook for memory error-based vulnerabilities
Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
Malware Go
David García

The Malware Created in Go Is A Trend And Is Here To Stay

Even though it cannot be said that Go is a new programming language (it is already more than ten years old), it does belong to that new batch of...
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration