Author
Sebastián Bortnik
Sebastián Bortnik
Technology & Research Manager

Education? CISM Certificate (Certified Information Security Manager).

Highlights of your career? Working on networking and information security for 10 years.

Joined ESET after wining a prize for university students with a paper on Heuristics.

Giving talks around Latam for the last 4 years in different universities, conferences in more than 15 countries.

Position and history at ESET? Education & Research Manager: Jan2012 – Present

Awareness & Research Coordinator: Aug2010 - Dec2011

Awareness & Research Specialist: Feb2009 – Jul2010

What malware do you hate the most? Conficker created a disaster here in Latam, so I’ve been talking too much about this worm for the last three years. It was too much.

Favorite activities? Listen to music, play the guitar, play sports. Also, to talk. =)

What is your golden rule for cyberspace? Don’t trust more than in the physical life.

When did you get your first computer and what kind was it? My mother was a computer teacher, so I've had contact with computers since I was 5 years old. The first was an XT Computer.

Favorite computer game/activity? I love to play basketball games on the computer.

More Info

Five interesting facts about the Morris worm (for its 25th anniversary)

On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet – and its release marked a new dawn for malicious software. Our five facts highlight what has changed since – and what hasn’t.

A prompt to save the world: new security features against malware in AutoCAD

Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.

Trends for 2013: astounding growth of mobile malware

In 2012 the number of unique detections of malware for Android increased globally by a factor of 17X (yes, that is 1,700%), and we expect the increase in 2013 to be even greater. This is one of the main predictions in the white paper we are releasing today: "Trends for 2013: astounding growth of mobile

New White Paper "Trends for 2012: Malware Goes Mobile"

Many of you have read the last few weeks that we published posts on trends for 2012 in the field of malware and cybercrime. In this series I wrote a post based on the document that the Education and Research team of ESET Latin America put together, entitled "2012 Predictions: More mobile malware and localized

Malware exploits death of North Korea's Kim Jong-il

As expected, malware developers and scam artists have greeted the death of North Korea's dictatorial leader, Kim Jong-il, with Black Hat SEO and Social Engineering attacks. The Supreme Leader of the Democratic People's Republic of Korea suffered a heart attack on a train journey last month and a steady stream of schemes to exploit the

2012 Predictions: More mobile malware and localized attacks

I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary

Osama Bin Laden dead, malware is alive

Yesterday the U.S. president, Barak Obama, held a conference at the White House to announce that the leader of Al Qaeda, Osama Bin Laden, was killed in Abbottabad, Pakistan. With no doubt, this is a story with an international impact, which the people will remember in the coming days and… attackers as well. As expected,

Three questions on World Backup Day: What? How? When?

A number of organizations dedicated to online hosting have launched an interesting initiative by naming this day, March 31th, World Backup Day. Who hasn’t ever lost a USB device and has regretted not having a backup? Who hasn’t experienced the death of a hard drive only to lose information that won’t ever be able to

How obvious are security threats?

My colleague Aryeh Goretsky shared a funny joke from Buttersafe, that I think invites us to mull cyber threats over. Before sharing my thought, I'd rather show you the cartoon itself and see if it makes you smile like it did to me: The cartoon raises an interesting question: how obvious are security threats? I

Inside a phishing attack: 35 credit cards in 5 hours

Phishing attacks have grown steadily in recent years, becoming a highly profitable attack for cyber criminals. In ESET Latin America’s Laboratory, we are used to finding and informing about phishing attack outbreaks in our region. A few days ago, we found a new case of phishing, for which we investigated the effectiveness of the attack.

Why do phishing attacks work better on mobile phones?

During my regular reading on the main feeds on information security this week, I found a small and particular news that, I consider, invites us to think about it. It turns out that according to a post by Mickey Boodaei, CEO of Trusteer, mobile phones users are three times more likely to become victims of

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.