Josep Albors

Josep Albors

ESET Spain Head of Awareness and Research


Education: Technician in Management Information Systems.

Highlights of your career? During my studies and before I joined ESET Spain I did several trainings in programming and languages, and I provided technical support to some companies. I also got Cisco's CCNA certification and the Computer Forensics Judicial Expert license.

Position and history at ESET? In 2005 I joined Ontinet, wholesaler of ESET in Spain, where I started working in technical support. I then became Head of Tech Support and my current position is Communications & Lab Director.

What malware do you hate the most? Every kind, no exception.

Favorite activities? Learning languages, travelling, meeting people, films, reading, videogames, and airsoft.

What is your golden rule for cyberspace? We are our own worst vulnerability but also our best antivirus.

When did you get your first computer and what kind was it? My first owned computer was an IBM PS/2 Model 30 with 640K of RAM, a hard drive of 20 MB and running in MS-DOS 4.0, although I had been fighting for years with my cousin's Spectrum and his BASIC.

Favorite computer game/activity? Apart from enjoying most of 8 and 16 bits retro games in console or PC, I'm a big fan of Civilization, XCOM and Fire Emblem sagas. I also like to install a couple of VMs in my computers to analyze the behavior of malware.


24 articles by Josep Albors

ESET research

Grandoreiro banking trojan impersonates Spain’s tax agency

Grandoreiro banking trojan impersonates Spain’s tax agency

ESET research

Grandoreiro banking trojan impersonates Spain’s tax agency

Beware the tax bogeyman – there are tax scams aplenty

ESET Research and Josep Albors21 Aug 20203 min. read


Mr. Robot S03E05: A Runtime Error, Credential Theft and New Easter Eggs

Mr. Robot S03E05: A Runtime Error, Credential Theft and New Easter Eggs

Mr. Robot S03E05: A Runtime Error, Credential Theft and New Easter Eggs

The latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.

Josep Albors14 Mar 20187 min. read


Mr. Robot: Now we know where Tyrell was hiding

Mr. Robot: Now we know where Tyrell was hiding

Mr. Robot: Now we know where Tyrell was hiding

Since nothing is what is seems, it's hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but the truth is that there is a group in the shadows that is pulling all the strings.

Josep Albors28 Nov 20174 min. read


Blade Runner 2049: A reflection on our use of technology

Blade Runner 2049: A reflection on our use of technology

Blade Runner 2049: A reflection on our use of technology

At present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.

Josep Albors07 Nov 20175 min. read


What are the risks of allowing people to use their smartphone at the bank?

What are the risks of allowing people to use their smartphone at the bank?

What are the risks of allowing people to use their smartphone at the bank?

Using smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank's WiFi and sensitive data.

Josep Albors23 Aug 20175 min. read


Digital Security

Is it safe to store corporate information on Google Drive (or similar services)?

Is it safe to store corporate information on Google Drive (or similar services)?

Digital Security

Is it safe to store corporate information on Google Drive (or similar services)?

When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.

Josep Albors26 Jul 20174 min. read


Digital Security

Two-factor authentication: An underutilized security measure in businesses

Two-factor authentication: An underutilized security measure in businesses

Digital Security

Two-factor authentication: An underutilized security measure in businesses

ESET's Josep Albors discusses two-factor authentication, which is an underutilized security measure in businesses all over the world.

Josep Albors03 Jul 20174 min. read


Digital Security

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

Digital Security

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.

Josep Albors10 Apr 20174 min. read


Digital Security

DNS attacks: How they try to direct you to fake pages

DNS attacks: How they try to direct you to fake pages

Digital Security

DNS attacks: How they try to direct you to fake pages

ESET's Josep Albors looks at how DNS attacks will try and direct you to fake pages.

Josep Albors27 Feb 20175 min. read