Aryeh Goretsky
Aryeh Goretsky
Distinguished Researcher
Go to latest posts

Highlights of your career? First employee at McAfee; Director at Tribal Voice, one of the first instant messaging companies; moderator at several popular online communities, including Lenovo, Lockergnome Help Forum, Scots Newsletter Forum and Wilders Security Forum; received Microsoft Most Valuable Professional and Neowin Most Valuable Contributor awards.

Position and history at ESET? Joined ESET in 2005 as Manager, Support; moved to Manager, Research in 2006; promoted to Distinguished Researcher in 2009.

What malware do you hate the most? Malware that alters, corrupts, destroys, modifies or steals a user’s data is on my “most-hated” list. To me, that’s the ultimate violation of a user’s computer.

Favorite activities? Reading, sleeping

What is your golden rule for cyberspace? Avoid the impulse to click on things.

When did you get your first computer and what kind was it? The first computer I used would probably have been a Commodore PET. I also used the Apple ][ and Commodore 64. This would have been the late 1970s or early 1980s.

Favorite computer game/activity? I spend most of my free computing time on forums helping answer other users’ technology questions.

For computer games, I have been playing ARK: Survival Evolved and Borderlands 2 most recently. For RPG and board games, CaH, Pathfinder, Settlers of Catan, and The Walking Dead.

The Return of Jacques Tits

It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that this scam continues unabated. In a nutshell, a message is sent to a publicly-visible email address listed on your website (sales, support, the CEO's office, a public relations contact, et cetera) from a

(Fake) Videos of Berlusconi attack

It is public knowledge that the Italian Prime Minister Silvio Berlusconi was hit in the face which left him with facial injuries, a broken nose and several broken teeth. The video of the attack is circulating on the Internet but at this time, if you search for them on any search engine it is possible

September’s Global Threat Report

ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by ESET's ThreatSense.Net™ cloud.  You can view the report here and, as always, the complete collection is available here in the Threat Trends section of our web site.  While the report identifies a number

Armor for Social Butterflies

I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users could take to strengthen their security online. In the course of our conversation, we came up with a list of simple steps you could take to better protect yourselves. Be careful about whom you

Follow us

Copyright © 2016 ESET, All Rights Reserved.