Author
Josep Albors
Josep Albors
ESET Spain Head of Awareness and Research
Go to latest posts

Education: Technician in Management Information Systems.

Highlights of your career? During my studies and before I joined ESET Spain I did several trainings in programming and languages, and I provided technical support to some companies. I also got Cisco's CCNA certification and the Computer Forensics Judicial Expert license.

Position and history at ESET? In 2005 I joined Ontinet, wholesaler of ESET in Spain, where I started working in technical support. I then became Head of Tech Support and my current position is Communications & Lab Director.

What malware do you hate the most? Every kind, no exception.

Favorite activities? Learning languages, travelling, meeting people, films, reading, videogames, and airsoft.

What is your golden rule for cyberspace? We are our own worst vulnerability but also our best antivirus.

When did you get your first computer and what kind was it? My first owned computer was an IBM PS/2 Model 30 with 640K of RAM, a hard drive of 20 MB and running in MS-DOS 4.0, although I had been fighting for years with my cousin's Spectrum and his BASIC.

Favorite computer game/activity? Apart from enjoying most of 8 and 16 bits retro games in console or PC, I'm a big fan of Civilization, XCOM and Fire Emblem sagas. I also like to install a couple of VMs in my computers to analyze the behavior of malware.

Mr. Robot: Now we know where Tyrell was hiding

Since nothing is what is seems, it’s hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but the truth is that there is a group in the shadows that is pulling all the strings.

Blade Runner 2049: A reflection on our use of technology

At present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.

What are the risks of allowing people to use their smartphone at the bank?

Using smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank’s WiFi and sensitive data.

Is it safe to store corporate information on Google Drive (or similar services)?

When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.

Two-factor authentication: An underutilized security measure in businesses

ESET’s Josep Albors discusses two-factor authentication, which is an underutilized security measure in businesses all over the world.

Spanish Harmada: More on tech support scams

David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.

DNS attacks: How they try to direct you to fake pages

ESET’s Josep Albors looks at how DNS attacks will try and direct you to fake pages.

Support scams now reign in Spain

If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley.

Fast Flux networks: What are they and how do they work?

The term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.

USBee: how to spy on an isolated system with a USB

USBee is a form of “air gap attack”. It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.

Mr. Robot security recap: 10 lessons learned from Season 02

Cybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.

Analyzing Mr. Robot: S02E01

One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET’s Josep Albors.

Malicious scripts in compromised websites and how to protect yourself

Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.

The 5 most common reasons for corporate data loss

ESET’s Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.

Jigsaw and how ransomware is becoming more aggressive with new features

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET’s Josep Albors.

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Weeks after it started attacking and encrypting victims’ information, Locky is still targeting many users. Here’s what you need to know about this threat.

‘Application not compatible’: Bayrob may be stealing your info

In this post, ESET’s Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.

Nemucod malware spreads ransomware Teslacrypt around the world

ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.

New Dridex campaign achieves high infection ratio in European countries

When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.

Follow us

Copyright © 2018 ESET, All Rights Reserved.