The New Hacker’s List and an Old Debate: Would you Hire a Hacker?
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
Education? CISM Certificate (Certified Information Security Manager).
Highlights of your career? Working on networking and information security for 10 years.
Joined ESET after wining a prize for university students with a paper on Heuristics.
Giving talks around Latam for the last 4 years in different universities, conferences in more than 15 countries.
Position and history at ESET? Education & Research Manager: Jan2012 – Present
Awareness & Research Coordinator: Aug2010 - Dec2011
Awareness & Research Specialist: Feb2009 – Jul2010
What malware do you hate the most? Conficker created a disaster here in Latam, so I’ve been talking too much about this worm for the last three years. It was too much.
Favorite activities? Listen to music, play the guitar, play sports. Also, to talk. =)
What is your golden rule for cyberspace? Don’t trust more than in the physical life.
When did you get your first computer and what kind was it? My mother was a computer teacher, so I've had contact with computers since I was 5 years old. The first was an XT Computer.
Favorite computer game/activity? I love to play basketball games on the computer.
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
Sebastián BortnikOn November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.
Sebastián BortnikSecurity researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.
Sebastián BortnikIn 2012 the number of unique detections of malware for Android increased globally by a factor of 17X (yes, that is 1,700%), and we expect the increase in 2013 to be even greater. This is one of the main predictions in the white paper we are releasing today: “Trends for 2013: astounding growth of mobile
Sebastián BortnikMany of you have read the last few weeks that we published posts on trends for 2012 in the field of malware and cybercrime. In this series I wrote a post based on the document that the Education and Research team of ESET Latin America put together, entitled “2012 Predictions: More mobile malware and localized
Sebastián BortnikAs expected, malware developers and scam artists have greeted the death of North Korea's dictatorial leader, Kim Jong-il, with Black Hat SEO and Social Engineering attacks. The Supreme Leader of the Democratic People's Republic of Korea suffered a heart attack on a train journey last month and a steady stream of schemes to exploit the
Sebastián BortnikI want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary
Sebastián BortnikYesterday the U.S. president, Barak Obama, held a conference at the White House to announce that the leader of Al Qaeda, Osama Bin Laden, was killed in Abbottabad, Pakistan. With no doubt, this is a story with an international impact, which the people will remember in the coming days and… attackers as well. As expected,
Sebastián BortnikA number of organizations dedicated to online hosting have launched an interesting initiative by naming this day, March 31th, World Backup Day. Who hasn’t ever lost a USB device and has regretted not having a backup? Who hasn’t experienced the death of a hard drive only to lose information that won’t ever be able to
Sebastián BortnikMy colleague Aryeh Goretsky shared a funny joke from Buttersafe, that I think invites us to mull cyber threats over. Before sharing my thought, I'd rather show you the cartoon itself and see if it makes you smile like it did to me: The cartoon raises an interesting question: how obvious are security threats? I
Sebastián BortnikPhishing attacks have grown steadily in recent years, becoming a highly profitable attack for cyber criminals. In ESET Latin America’s Laboratory, we are used to finding and informing about phishing attack outbreaks in our region. A few days ago, we found a new case of phishing, for which we investigated the effectiveness of the attack.
Sebastián BortnikDuring my regular reading on the main feeds on information security this week, I found a small and particular news that, I consider, invites us to think about it. It turns out that according to a post by Mickey Boodaei, CEO of Trusteer, mobile phones users are three times more likely to become victims of
Sebastián Bortnik