Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The era of a connected society Kevin Ashton just asks companies to use the IoT
  • Big Data
    • A formula for Victory: Big Data in Formula 1 What to expect from Artificial Intelligence in 2020?
  • Cybersecurity
    • Challenges and Business Opportunities of Post Quantum Cryptography If you want to change your employees’ security habits, don’t call their will, modify their environment instead
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

David García

Senior Security Analyst at the Innovation and Laboratory Area at ElevenPaths.



Login screen for Instagram mobile
David García

The new end of passwords

Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
blog-ransomware-pilares
David García

Where does ransomware attack? Three main pillars

It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
David García

What’s new in the OWASP 2021 ranking?

OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
Malware Go
David García

The Malware Created in Go Is A Trend And Is Here To Stay

Even though it cannot be said that Go is a new programming language (it is already more than ten years old), it does belong to that new batch of...
Bestiary of a Poorly Managed Memory (IV)
David García

Bestiary of a Poorly Managed Memory (IV)

What happens when we use uninitialized memory? Read this article and find out about the latest developments in memory management.
Bestiary of a Poorly Managed Memory (III)
David García

Bestiary of a Poorly Managed Memory (III)

Our expert David Garcia explains some consequences of poor memory management such as dangling pointers or memory leaks.
Bestiary of a Poorly Managed Memory (II)
David García

Bestiary of a Poorly Managed Memory (II)

Our expert David Garcia shows what happens when the same block of reserved memory is released twice, the so-called double free.
Bestiary of a Poorly Managed Memory (I)
David García

Bestiary of a Poorly Managed Memory (I)

WannaCry, EternalBlue, Conficker... their cyber attacks have one thing in common: the arbitrary code execution. Discover how they happen.

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Gonzalo Fernández Rodríguez
What is a Cloud-Native Application?
The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Photo: Vardan Papikyan / Unsplash
Alberto García García-Castro
Incentives in business blockchain networks: a new approach
It has always been a fundamental part of the technology to use incentives that reward collaboration and good practices among participants in a blockchain network. So much so that...
Two men working with computer
New Markets Team
Human Factors in Cybersecurity: Protect Yourself
Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Roberto García Esteban
Cloud market trends until 2025
All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Image from No Man's Sky video game
Javier Coronado Blazquez
Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games
The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration