Sex in the digital era: How secure are smart sex toys?
ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things
Education? Information Systems Engineer graduated from the Universidad Tecnológica Nacional of Argentina. I’ve taken numerous independent courses oriented towards information security and I'm currently specializing in mobile malware analysis.
Highlights of your career? Since those early years in college I participated in several research projects regarding software development, Artificial Intelligence and information security, simultaneously working as a freelance programmer.
Position and history at ESET? After several months working as an external technical writer for WeLiveSecurity in Spanish, I joined ESET Latin America in January 2015 as a Security Researcher, to detect and analyze existing trends regarding information security.
What malware do you hate the most? The one from which I can’t learn anything.
Favorite activities? Learning languages, travelling, reading, writing, drawing, playing guitar, dancing, horse riding, biking, among others.
What is your golden rule for cyberspace? Setting up a safe work environment is very important, but even more important is to be logical... always!
When did you get your first computer and what kind was it? In 1999 I got my first Compaq Deskpro 2000 with a Celeron processor and an awesome 1.8 GB hard drive.
Favorite computer game/activity? Researching new technologies and analyzing malware, with just the right dose of any game that allows me to destroy orcs in the Middle Earth.
ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things
Denise Giusto Bilić and Cecilia PastorinoWhile you’re living out your fantasies, your internet-enabled sex toy may be setting you up for a privacy nightmare
Denise Giusto Bilić and Cecilia PastorinoMalware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
Denise Giusto BilićA primer on why internet-enabled TVs make for attractive and potentially soft targets, and how cybercriminals can ruin more than your TV viewing experience
Denise Giusto BilićFor Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year
Denise Giusto BilićRecommendations for pentesters looking for security flaws in iOS applications made by developers
Denise Giusto BilićMalware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.
Denise Giusto BilićGranted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
Denise Giusto BilićBy the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.
Denise Giusto BilićThese new security measures will undoubtedly not only impact the security of data stored on a phone that has been lost or stolen, but could also complicate the progress of criminal investigations requiring the forensic analysis of a phone.
Denise Giusto BilićWhat awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
Denise Giusto BilićA new airline scam is promising people free Emirates flight tickets if they take part in a "fast survey", ESET's Denise Giusto Bilić reports.
Denise Giusto BilićThere are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.
Denise Giusto BilićIn this feature, ESET's Denise Giusto Bilić offers a detailed overview as to how to avoid certificate pinning in the latest versions of Android.
Denise Giusto BilićCyberbullying is an issue causing havoc in schools across the world, but a Finnish scheme created in 2009 is making a big difference.
Denise Giusto BilićUnderstanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.
Denise Giusto BilićMany people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.
Denise Giusto BilićGetting started on designing a network is a task of formidable proportions, but all the more so if you are looking to build a secure network.
Denise Giusto BilićInformation security has become an even more critical factor of the business model, as it protects the most essential asset: information.
Denise Giusto BilićThere have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.
Denise Giusto Bilić