Author
Josep Albors
Josep_Albors
Josep Albors
ESET Spain Communications & Lab Director
Go to latest posts

Education: Technician in Management Information Systems.

Highlights of your career? During my studies and before I joined ESET Spain I did several trainings in programming and languages, and I provided technical support to some companies. I also got Cisco's CCNA certification and the Computer Forensics Judicial Expert license.

Position and history at ESET? In 2005 I joined Ontinet, wholesaler of ESET in Spain, where I started working in technical support. I then became Head of Tech Support and my current position is Communications & Lab Director.

What malware do you hate the most? Every kind, no exception.

Favorite activities? Learning languages, travelling, meeting people, films, reading, videogames, and airsoft.

What is your golden rule for cyberspace? We are our own worst vulnerability but also our best antivirus.

When did you get your first computer and what kind was it? My first owned computer was an IBM PS/2 Model 30 with 640K of RAM, a hard drive of 20 MB and running in MS-DOS 4.0, although I had been fighting for years with my cousin's Spectrum and his BASIC.

Favorite computer game/activity? Apart from enjoying most of 8 and 16 bits retro games in console or PC, I'm a big fan of Civilization, XCOM and Fire Emblem sagas. I also like to install a couple of VMs in my computers to analyze the behavior of malware.

Fast Flux networks: What are they and how do they work?

The term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.

USBee: how to spy on an isolated system with a USB

USBee is a form of “air gap attack”. It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.

Mr. Robot security recap: 10 lessons learned from Season 02

Cybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.

Analyzing Mr. Robot: S02E01

One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET’s Josep Albors.

Malicious scripts in compromised websites and how to protect yourself

Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.

The 5 most common reasons for corporate data loss

ESET’s Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.

Jigsaw and how ransomware is becoming more aggressive with new features

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET’s Josep Albors.

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Weeks after it started attacking and encrypting victims’ information, Locky is still targeting many users. Here’s what you need to know about this threat.

‘Application not compatible’: Bayrob may be stealing your info

In this post, ESET’s Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.

Nemucod malware spreads ransomware Teslacrypt around the world

ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.

New Dridex campaign achieves high infection ratio in European countries

When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.

Fake vouchers and WhatsApp: Analyzing a new scam trend

Over the last few weeks we’ve seen an increase in fake vouchers being spread via WhatsApp. This scam has all the hallmarks of a global campaign.

400GB of info leaked from Hacking Team

The “Hacking Team” Security Company has been hacked and more than 400 GB of confidential info has been leaked by a group of unidentified attackers.

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

Exploits: What are they and how do they work?

What is an exploit and why are they important?

Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

Follow us

Copyright © 2017 ESET, All Rights Reserved.