Aryeh Goretsky
Aryeh Goretsky
Distinguished Researcher
Go to latest posts

Highlights of your career? First employee at McAfee; Director at Tribal Voice, one of the first instant messaging companies; moderator at several popular online communities, including Lenovo, Lockergnome Help Forum, Scots Newsletter Forum and Wilders Security Forum; received Microsoft Most Valuable Professional and Neowin Most Valuable Contributor awards.

Position and history at ESET? Joined ESET in 2005 as Manager, Support; moved to Manager, Research in 2006; promoted to Distinguished Researcher in 2009.

What malware do you hate the most? Malware that alters, corrupts, destroys, modifies or steals a user’s data is on my “most-hated” list. To me, that’s the ultimate violation of a user’s computer.

Favorite activities? Reading, sleeping

What is your golden rule for cyberspace? Avoid the impulse to click on things.

When did you get your first computer and what kind was it? The first computer I used would probably have been a Commodore PET. I also used the Apple ][ and Commodore 64. This would have been the late 1970s or early 1980s.

Favorite computer game/activity? I spend most of my free computing time on forums helping answer other users’ technology questions.

I used to play City of Heroes and World of Warcraft with others, but game so infrequently now that everyone in those teams/guilds had pretty much surpassed me. These days, it’s mostly solo games of Diablo 3 and Torchlight 2.

Schrödinger’s antivirus: The immortality of antivirus software

The question of antivirus software being dead is one that doesn’t seem to go away. Why is that? Distinguished ESET researcher Aryeh Goretsky explores.

Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS

Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

Advanced persistent threats (APTs) are a growing concern to the world’s companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

Superfish: Lenovo goes on the bloatware offensive

Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.

Do you really need antivirus software for Linux desktops?

It started, innocently enough, as a question asked in the ESET Security Forum titled “Eset – Do I Really Need Antivirus On My Linux Distros?” However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.

2014 Security Lessons: Making 2015 More Secure

A few days ago, I gave a webinar titled Make 2015 More Secure: Lessons from 2014, which was a follow-up to the 2014 Mid-Year Threat Report webinar from this summer.

Cyber Monday: Costco and Home Depot phishing emails target shoppers

Thanksgiving Day phishing emails leverage this popular American holiday to target consumers who shop at The Home Depot and Costco. Here’s what to watch for, and advice on how to handle such messages.

Gamescom: How gaming grew up into a target for crime

Video games have gone since the late 1970s and early 1980s from being a small offshoot of the “traditional” computing industry to becoming a full-fledged multi-billion dollar industry – with its own brand of criminal.

Comic-Con 2014: Eight super-powered digital safety tips

Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate – so that means we will probably see double that number of connected devices – laptops, tablets, smartphones and perhaps even tricorders.

Catch the ESET 2014 Mid-Year Threat Report broadcast

With the first half of the year almost over, it’s time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.

Goodbye, Windows XP!

This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003. After today, these programs have reached their End of Life (EOL) status, and will no longer be supported by Microsoft

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

Time to Move On From Windows XP

Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.

Facebook and Whatsapp: Security and privacy after the $19B deal

The acquisition of chat service Whatsapp for $19 billion has been the technology story of the week – but serious privacy and security questions remain over Facebook’s new messaging service.

Can you hear us now? ESET researchers podcast every week

Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.

Windows 8.1 – security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1″ point release of Windows 8.

Orbital Decay: the dark side of a popular file downloading tool

Orbit Downloader by Innoshock is a popular browser add-on often used to download embedded videos from sites such as YouTube. But the popular add-on has disturbing hidden functions.

Safe Summer PC Usage – beat the heat and stay secure with your laptop, tablet or smartphone

Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.

Needles and haystacks – the art of threat attribution

ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.

Follow us

Copyright © 2015 ESET, All Rights Reserved.