Denise Giusto Bilić
Denise Giusto Bilić
Security Researcher
Go to latest posts

Education? Information Systems Engineer graduated from the Universidad Tecnológica Nacional of Argentina. I’ve taken numerous independent courses oriented towards information security and I'm currently specializing in mobile malware analysis.

Highlights of your career? Since those early years in college I participated in several research projects regarding software development, Artificial Intelligence and information security, simultaneously working as a freelance programmer.

Position and history at ESET? After several months working as an external technical writer for WeLiveSecurity in Spanish, I joined ESET Latin America in January 2015 as a Security Researcher, to detect and analyze existing trends regarding information security.

What malware do you hate the most? The one from which I can’t learn anything.

Favorite activities? Learning languages, travelling, reading, writing, drawing, playing guitar, dancing, horse riding, biking, among others.

What is your golden rule for cyberspace? Setting up a safe work environment is very important, but even more important is to be logical... always!

When did you get your first computer and what kind was it? In 1999 I got my first Compaq Deskpro 2000 with a Celeron processor and an awesome 1.8 GB hard drive.

Favorite computer game/activity? Researching new technologies and analyzing malware, with just the right dose of any game that allows me to destroy orcs in the Middle Earth.

Are mobile devices insecure by nature?

Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.

Ada Lovelace Day: celebrating women in technology

By the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.

Security and privacy on the new iOS 11

These new security measures will undoubtedly not only impact the security of data stored on a phone that has been lost or stolen, but could also complicate the progress of criminal investigations requiring the forensic analysis of a phone.

Mobile security: The reality of malware … augmented

What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.

New airline scam promises free Emirates flight tickets

A new airline scam is promising people free Emirates flight tickets if they take part in a “fast survey”, ESET’s Denise Giusto Bilić reports.

How to do an APK Analysis Using AppMon

There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.

How to avoid certificate pinning in the latest versions of Android

In this feature, ESET’s Denise Giusto Bilić offers a detailed overview as to how to avoid certificate pinning in the latest versions of Android.

Finland – hope in the fight against cyberbullying

Cyberbullying is an issue causing havoc in schools across the world, but a Finnish scheme created in 2009 is making a big difference.

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

How do you know if your smartphone has been compromised?

Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.

Strengthening the different layers of IT networks

Getting started on designing a network is a task of formidable proportions, but all the more so if you are looking to build a secure network.

5 steps to take after a company is infected

Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.

10 tips for protecting your virtual Bitcoin wallet

There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.

Follow us

Copyright © 2018 ESET, All Rights Reserved.