Grandoreiro banking trojan impersonates Spain’s tax agency
Beware the tax bogeyman – there are tax scams aplenty
Education: Technician in Management Information Systems.
Highlights of your career? During my studies and before I joined ESET Spain I did several trainings in programming and languages, and I provided technical support to some companies. I also got Cisco's CCNA certification and the Computer Forensics Judicial Expert license.
Position and history at ESET? In 2005 I joined Ontinet, wholesaler of ESET in Spain, where I started working in technical support. I then became Head of Tech Support and my current position is Communications & Lab Director.
What malware do you hate the most? Every kind, no exception.
Favorite activities? Learning languages, travelling, meeting people, films, reading, videogames, and airsoft.
What is your golden rule for cyberspace? We are our own worst vulnerability but also our best antivirus.
When did you get your first computer and what kind was it? My first owned computer was an IBM PS/2 Model 30 with 640K of RAM, a hard drive of 20 MB and running in MS-DOS 4.0, although I had been fighting for years with my cousin's Spectrum and his BASIC.
Favorite computer game/activity? Apart from enjoying most of 8 and 16 bits retro games in console or PC, I'm a big fan of Civilization, XCOM and Fire Emblem sagas. I also like to install a couple of VMs in my computers to analyze the behavior of malware.
Beware the tax bogeyman – there are tax scams aplentyESET Research and Josep Albors
The latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.Josep Albors
Since nothing is what is seems, it's hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but the truth is that there is a group in the shadows that is pulling all the strings.Josep Albors
At present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.Josep Albors
Using smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank's WiFi and sensitive data.Josep Albors
When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.Josep Albors
ESET's Josep Albors discusses two-factor authentication, which is an underutilized security measure in businesses all over the world.Josep Albors
David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.David Harley and Josep Albors
With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.Josep Albors
ESET's Josep Albors looks at how DNS attacks will try and direct you to fake pages.Josep Albors
If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley.David Harley and Josep Albors
The term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.Josep Albors
USBee is a form of "air gap attack". It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.Josep Albors
Cybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.Sabrina Pagnotta and Josep Albors
One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.Josep Albors
Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.Josep Albors
ESET's Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.Josep Albors
There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET's Josep Albors.Josep Albors
Weeks after it started attacking and encrypting victims' information, Locky is still targeting many users. Here's what you need to know about this threat.Josep Albors and Raphael Labaca Castro
In this post, ESET's Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.Josep Albors