Miguel Ángel Mendoza

Miguel Ángel Mendoza

Security Researcher


Education: I studied Computer Engineering at the National Autonomous University of Mexico (UNAM).

Career Summary: I was part of UNAM-CERT, performing activities such as the implementation of safety standards and best practices, coordination of the Information Security Management System and computer security audits.

Position and history at ESET: In 2014 I joined the ESET Mexico local team as an Awareness & Research Specialist.

What is the malware you hate the most? The malware that is developed using sponsorship.

Favorite activities: Reading, playing sports and watching movies.

What is your golden rule in cyberspace? If something sounds too good to be true, it usually is.

When did you have your first computer and what type was it? In 2001, a Pentium 4 computer.

What is your favorite activity or game on the computer? My favorite activities on the web are reading technology news and politics. Also chatting. Despite the years, my favorite game is still Super Mario Bros. 3.


21 articles by Miguel Ángel Mendoza

Scams

Costco survey scam targets WhatsApp users

Costco survey scam targets WhatsApp users

Scams

Costco survey scam targets WhatsApp users

If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is

Miguel Ángel Mendoza30 Jun 20224 min. read


Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege: A strategy of limiting access to what is essential

Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity

Miguel Ángel Mendoza02 Jul 20184 min. read


Cryptojacking: The result of the “cryptocurrency rush”

Cryptojacking: The result of the “cryptocurrency rush”

Cryptojacking: The result of the “cryptocurrency rush”

Tools for mining cryptocurrencies also fall into this category, as in many cases the websites cannot warn users since they have been compromised themselves, hence even the administrators may not be aware that they are contributing to mining for the benefit of an attacker.

Miguel Ángel Mendoza06 Mar 20184 min. read


Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.

Miguel Ángel Mendoza05 Feb 20183 min. read


Five ways to check if your router is configured securely

Five ways to check if your router is configured securely

Five ways to check if your router is configured securely

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

Miguel Ángel Mendoza23 Jan 20185 min. read


Six things to consider before implementing an ISMS

Six things to consider before implementing an ISMS

Six things to consider before implementing an ISMS

These factors can be key to the success or failure of the ISMS implementation, due to the day-to-day activities in the organization and the resources required for system operation.

Miguel Ángel Mendoza06 Dec 20175 min. read


Privacy

The right to privacy in the digital era

The right to privacy in the digital era

Privacy

The right to privacy in the digital era

ESET's Miguel Ángel Mendoza discusses the right to privacy in the digital era, which is an increasingly important issue.

Miguel Ángel Mendoza03 Apr 20173 min. read


Digital Security

Challenges and implications of cybersecurity legislation

Challenges and implications of cybersecurity legislation

Digital Security

Challenges and implications of cybersecurity legislation

Cybersecurity legislation: organization, collaboration and diffusion across the globe, and working towards the populization of cybersecurity culture

Miguel Ángel Mendoza13 Mar 20179 min. read


Digital Security

Forensic analysis techniques for digital imaging

Forensic analysis techniques for digital imaging

Digital Security

Forensic analysis techniques for digital imaging

ESET's Miguel Ángel Mendoza looks at a range of forensic analysis techniques that are used to examine digital images.

Miguel Ángel Mendoza13 Jan 20174 min. read