Denise Giusto Bilić

Denise Giusto Bilić

Security Researcher


Education? Information Systems Engineer graduated from the Universidad Tecnológica Nacional of Argentina. I’ve taken numerous independent courses oriented towards information security and I'm currently specializing in mobile malware analysis.

Highlights of your career? Since those early years in college I participated in several research projects regarding software development, Artificial Intelligence and information security, simultaneously working as a freelance programmer.

Position and history at ESET? After several months working as an external technical writer for WeLiveSecurity in Spanish, I joined ESET Latin America in January 2015 as a Security Researcher, to detect and analyze existing trends regarding information security.

What malware do you hate the most? The one from which I can’t learn anything.

Favorite activities? Learning languages, travelling, reading, writing, drawing, playing guitar, dancing, horse riding, biking, among others.

What is your golden rule for cyberspace? Setting up a safe work environment is very important, but even more important is to be logical... always!

When did you get your first computer and what kind was it? In 1999 I got my first Compaq Deskpro 2000 with a Celeron processor and an awesome 1.8 GB hard drive.

Favorite computer game/activity? Researching new technologies and analyzing malware, with just the right dose of any game that allows me to destroy orcs in the Middle Earth.


20 articles by Denise Giusto Bilić

ESET research

Sex in the digital era: How secure are smart sex toys?

Sex in the digital era: How secure are smart sex toys?

ESET research

Sex in the digital era: How secure are smart sex toys?

ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things

Denise Giusto Bilić and Cecilia Pastorino11 Mar 202110 min. read


Less Technical

Fifty shades of vulnerable: How to play it safe with your smart sex toy

Fifty shades of vulnerable: How to play it safe with your smart sex toy

Less Technical

Fifty shades of vulnerable: How to play it safe with your smart sex toy

While you’re living out your fantasies, your internet-enabled sex toy may be setting you up for a privacy nightmare

Denise Giusto Bilić12 Feb 20217 min. read


Mobile Security

Semi‑annual balance of mobile security 2019

Semi‑annual balance of mobile security 2019

Mobile Security

Semi‑annual balance of mobile security 2019

Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.

Denise Giusto Bilić05 Sep 20195 min. read


Internet of Things

Smart TVs: Yet another way for attackers to break into your home?

Smart TVs: Yet another way for attackers to break into your home?

Internet of Things

Smart TVs: Yet another way for attackers to break into your home?

A primer on why internet-enabled TVs make for attractive and potentially soft targets, and how cybercriminals can ruin more than your TV viewing experience

Denise Giusto Bilić02 Aug 20195 min. read


Mobile Security

Semi-annual balance of mobile security

Semi-annual balance of mobile security

Mobile Security

Semi-annual balance of mobile security

For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year

Denise Giusto Bilić29 Aug 20182 min. read


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 20183 min. read


Mobile Security

Tricks that cybercriminals use to hide in your phone

Tricks that cybercriminals use to hide in your phone

Mobile Security

Tricks that cybercriminals use to hide in your phone

Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.

Denise Giusto Bilić16 Mar 20186 min. read


Mobile Security

Are mobile devices insecure by nature?

Are mobile devices insecure by nature?

Mobile Security

Are mobile devices insecure by nature?

Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.

Denise Giusto Bilić19 Jan 20183 min. read


Digital Security

Ada Lovelace Day: Celebrating women in technology

Ada Lovelace Day: Celebrating women in technology

Digital Security

Ada Lovelace Day: Celebrating women in technology

By the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.

Denise Giusto Bilić10 Oct 20174 min. read