Work from home: Securing RDP and remote access
As work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.
Highlights of your career? First employee at McAfee; Director at Tribal Voice, one of the first instant messaging companies; moderator at several popular online communities, including Lenovo, Lockergnome Help Forum, Scots Newsletter Forum and Wilders Security Forum; received Microsoft Most Valuable Professional and Neowin Most Valuable Contributor awards.
Position and history at ESET? Joined ESET in 2005 as Manager, Support; moved to Manager, Research in 2006; promoted to Distinguished Researcher in 2009.
What malware do you hate the most? Malware that alters, corrupts, destroys, modifies or steals a user’s data is on my "most-hated" list. To me, that’s the ultimate violation of a user’s computer.
Favorite activities? Keeping telephone scammers on the phone for as long as possible. Also, reading and sleeping.
What is your golden rule for cyberspace? Avoid the impulse to click on things.
When did you get your first computer and what kind was it? The first computer I used would probably have been a Commodore PET. I also used the Apple ][ and Commodore 64. This would have been the late 1970s or early 1980s.
Favorite computer game/activity? I spend most of my free computing time on forums helping answer other users’ technology questions. For computer games, I have been playing ARK: Survival Evolved and Borderlands 2 most recently. For RPG and board games, CaH, Pathfinder, Settlers of Catan, Starfinder and The Walking Dead.
As work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.
Aryeh Goretsky and Cameron CampIf we can’t secure the supply chain, eventually everything else will break
Aryeh GoretskyBrute-force attacks and BlueKeep exploits usurp convenience of direct RDP connections; ESET releases a tool to test your Windows machines for vulnerable versions
Aryeh GoretskyA closer look at the damage caused by smoke particles and some steps you can take to aid recovery
Aryeh GoretskyUsing the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer
Aryeh GoretskyThe first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.
Aryeh GoretskyWith analysts predicting a big shift to Windows 10 in the enterprise in 2017, a new ESET white paper looks at security and privacy changes in Windows 10 Anniversary Update, the build that Microsoft expects its business customers to run on the majority of their desktop computers.
Aryeh GoretskyAhead of this year's Comic-Con in San Diego, ESET's Aryeh Goretsky has put together a handy travel, security and privacy guide.
Aryeh GoretskyAs Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.
Aryeh GoretskyWith more of a whimper than a bang, Microsoft has followed up on its August 2014 promise to end support for older versions of Internet Explorer. As of today (January 12th, 2016), Microsoft will end support and security updates for several versions of Internet Explorer running on various versions of Windows.
Aryeh GoretskyIt has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft's flagship operating system is going to be on the minds of administrators for 2016, says ESET's Aryeh Goretsky.
Aryeh GoretskyThe question of antivirus software being dead is one that doesn't seem to go away. Why is that? Distinguished ESET researcher Aryeh Goretsky explores.
Aryeh GoretskyWindows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
Aryeh GoretskyAdvanced persistent threats (APTs) are a growing concern to the world's companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.
Aryeh GoretskyOne thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
Aryeh GoretskyIts been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish's Visual Search adware on some of its popular consumer laptops during last year's holiday shopping season.
Aryeh GoretskyIt started, innocently enough, as a question asked in the ESET Security Forum titled "Eset – Do I Really Need Antivirus On My Linux Distros?" However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.
Aryeh GoretskyA few days ago, I gave a webinar titled Make 2015 More Secure: Lessons from 2014, which was a follow-up to the 2014 Mid-Year Threat Report webinar from this summer.
Aryeh GoretskyThanksgiving Day phishing emails leverage this popular American holiday to target consumers who shop at The Home Depot and Costco. Here's what to watch for, and advice on how to handle such messages.
Aryeh GoretskyVideo games have gone since the late 1970s and early 1980s from being a small offshoot of the "traditional" computing industry to becoming a full-fledged multi-billion dollar industry - with its own brand of criminal.
Aryeh GoretskyThis patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003. After today, these programs have reached their End of Life (EOL) status, and will no longer be supported by Microsoft
Aryeh GoretskyMicrosoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.
Aryeh GoretskyOur white paper on Potentially Unwanted Applications (PUAs) has been revised with additional information, including information about how legitimate software can become classified as a PUA due to its misuse, a discussion of a type of downloader called a software wrapper and updated screen shots. It can be found in the White Papers section Problematic,
Aryeh GoretskyUPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information about how update services work, why they might distribute third-party code and what might be done to prevent malware from being distributed on services like Microsoft’s Windows Update in the future. 7-FEB-2011.
Aryeh GoretskyIt is public knowledge that the Italian Prime Minister Silvio Berlusconi was hit in the face which left him with facial injuries, a broken nose and several broken teeth. The video of the attack is circulating on the Internet but at this time, if you search for them on any search engine it is possible
Aryeh GoretskyESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by ESET’s ThreatSense.Net™ cloud. You can view the report here and, as always, the complete collection is available here in the Threat Trends section of our web site. While the report identifies a number
Aryeh Goretsky