Think before you scan: How fraudsters can exploit QR codes to steal money
QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.
Education? Studied Networking and Communication at Palermo University. CCNA and CCNP Cisco certifications and Certified Ethical Hacker (CEH).
Highlights of your career? I worked for almost 10 years in Infrastructure and specialized in network security. In 2012 I got in charge of the information security area of a company in the healthcare industry, where I developed the “Information Security Management System” and certified ISO 27001.
Position and history at ESET? First met ESET in 2013 when I joined Argentina Cibersegura as a volunteer. In January 2017 I became a Security Researcher in ESET Latin America.
What malware do you hate the most? Trojans, because they take advantage of unwary users.
Favorite activities? Travelling, meeting new people and places all over the world. Also amateur photography and rollerskating.
What is your golden rule for cyberspace? Don’t believe everything you see on the Internet. Be careful, the information you share online may be used against you.
When did you get your first computer and what kind was it? It was an Apple II Plus that belonged to my dad before I was born. My mom used to program games for me in the Apple, and I used it for several years until I got my first IBM with Windows 3.11.
Favorite computer game/activity? Investigate, try, break and learn. I also like scape games and all kind of logic games. Wholehearted fan of Carmen Sandiego and Monkey Island.
QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.
Cecilia PastorinoESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things
Denise Giusto Bilić and Cecilia PastorinoWhile you’re living out your fantasies, your internet-enabled sex toy may be setting you up for a privacy nightmare
Denise Giusto Bilić and Cecilia PastorinoAre you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online
Cecilia PastorinoHow schools and educators can address and help prevent abusive behavior on the internet
Cecilia PastorinoA closer look at the technology that is rapidly growing in popularity
Cecilia PastorinoTaking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code
Cecilia PastorinoSo far in 2018, the NGO has launched two charity campaigns with the aim of raising funds through cryptocurrency mining.
Cecilia PastorinoHow to use parental control apps to protect children and the fine line that exists between controlling the use of technology and invasion of privacy
Cecilia PastorinoThe big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.
Cecilia PastorinoThis is aimed at improving security at the time of the handshake, which is when the key is being exchanged. As a result, WPA3 is poised to provide robust security even if short or weak passwords are used, i.e. those that don’t contain a combination of letters, numbers and symbols.
Cecilia PastorinoIn general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are some additional issues to take into account.
Cecilia PastorinoThe router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it.
Cecilia PastorinoMost companies have switched the majority of their services and information over to the cloud. There are many reasons for this, ranging from cost to practicalities.
Cecilia PastorinoA homograph attack is what happens when attackers register domains that are similar to the originals, with valid certificates.
Cecilia Pastorino