Bio

Aryeh Goretsky

Aryeh Goretsky

Distinguished Researcher

Highlights of your career? First employee at McAfee; Director at Tribal Voice, one of the first instant messaging companies; moderator at several popular online communities, including Lenovo, Lockergnome Help Forum, Scots Newsletter Forum and Wilders Security Forum; received Microsoft Most Valuable Professional and Neowin Most Valuable Contributor awards.

Position and history at ESET? Joined ESET in 2005 as Manager, Support; moved to Manager, Research in 2006; promoted to Distinguished Researcher in 2009.

What malware do you hate the most? Malware that alters, corrupts, destroys, modifies or steals a user’s data is on my "most-hated" list. To me, that’s the ultimate violation of a user’s computer.

Favorite activities? Keeping telephone scammers on the phone for as long as possible. Also, reading and sleeping.

What is your golden rule for cyberspace? Avoid the impulse to click on things.

When did you get your first computer and what kind was it? The first computer I used would probably have been a Commodore PET. I also used the Apple ][ and Commodore 64. This would have been the late 1970s or early 1980s.

Favorite computer game/activity? I spend most of my free computing time on forums helping answer other users’ technology questions. For computer games, I have been playing ARK: Survival Evolved and Borderlands 2 most recently. For RPG and board games, CaH, Pathfinder, Settlers of Catan, Starfinder and The Walking Dead.

Articles by author

Catch the ESET 2014 Mid‑Year Threat Report broadcast

With the first half of the year almost over, it's time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.

Goodbye, Windows XP!

This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003. After today, these programs have reached their End of Life (EOL) status, and will no longer be supported by Microsoft

Time to Move On From Windows XP

Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.

ComboFix fixed: popular utility safe to use

ESET’s threat researchers received a surprise earlier this week when they began receiving reports from ESET LiveGrid that downloads of ComboFix, a tool popular with advanced users for removing malware, were detected as being infected by a variant of the Sality virus, Win32/Sality.NBA.

W8ing for V6: What ESET has in store for Windows 8 Users

[UPDATE: 10/23/2012, 3:00PM — Testing agency AV-Comparatives has reviewed both ESET NOD32 Antivirus and ESET Smart Security for Windows 8 compatibility.   I have updated the blog post below.   AG] The release of Windows 8 is this week and interest remains high in Microsoft’s new flagship operating system.   We have already taken a

A white paper: Windows 8’s Security Features

[NOTE: For the latest information about compatibility between ESET’s software and Windows 8, please see the following blog post: W8ing for V6: What ESET has in store for Windows 8 Users. (10/23/2012, 4:15PM)] Windows 8 will be available to the public in three weeks, and interest in the latest version of Microsoft’s flagship operating system

.ASIA domain name scams still going strong

Today I received the following message in my inbox, claiming to be from the Asian Domain Registration Service and warning me that the eset brand was in danger of being registered by a third-party.   Here is the message I received, which I’ve included in its entirety, except for a few bits: Received: from mail.umail168.cn4e.com

Trojan in Microsoft Update Catalog – A Bunny Bites Back

UPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information about how update services work, why they might distribute third-party code and what might be done to prevent malware from being distributed on services like Microsoft’s Windows Update in the future. 7-FEB-2011.

What are Heuristics?

It is generally well-understood that antimalware programs—the software which detects computer viruses, worms, trojan horses and other threats to your system—work by scanning files using signatures they already have. A signature could be as simple as a string[i] (like using the “find” command in your word processor to locate a particular piece of text) or as

(Fake) Videos of Berlusconi attack

It is public knowledge that the Italian Prime Minister Silvio Berlusconi was hit in the face which left him with facial injuries, a broken nose and several broken teeth. The video of the attack is circulating on the Internet but at this time, if you search for them on any search engine it is possible

September’s Global Threat Report

ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by ESET’s ThreatSense.Net™ cloud.  You can view the report here and, as always, the complete collection is available here in the Threat Trends section of our web site.  While the report identifies a number