Grandoreiro banking trojan impersonates Spain’s tax agency
Beware the tax bogeyman – there are tax scams aplenty
Education: Technician in Management Information Systems.
Highlights of your career? During my studies and before I joined ESET Spain I did several trainings in programming and languages, and I provided technical support to some companies. I also got Cisco's CCNA certification and the Computer Forensics Judicial Expert license.
Position and history at ESET? In 2005 I joined Ontinet, wholesaler of ESET in Spain, where I started working in technical support. I then became Head of Tech Support and my current position is Communications & Lab Director.
What malware do you hate the most? Every kind, no exception.
Favorite activities? Learning languages, travelling, meeting people, films, reading, videogames, and airsoft.
What is your golden rule for cyberspace? We are our own worst vulnerability but also our best antivirus.
When did you get your first computer and what kind was it? My first owned computer was an IBM PS/2 Model 30 with 640K of RAM, a hard drive of 20 MB and running in MS-DOS 4.0, although I had been fighting for years with my cousin's Spectrum and his BASIC.
Favorite computer game/activity? Apart from enjoying most of 8 and 16 bits retro games in console or PC, I'm a big fan of Civilization, XCOM and Fire Emblem sagas. I also like to install a couple of VMs in my computers to analyze the behavior of malware.
Beware the tax bogeyman – there are tax scams aplenty
ESET Research and Josep AlborsThe latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.
Josep AlborsSince nothing is what is seems, it's hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but the truth is that there is a group in the shadows that is pulling all the strings.
Josep AlborsAt present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.
Josep AlborsUsing smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank's WiFi and sensitive data.
Josep AlborsWhen it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.
Josep AlborsESET's Josep Albors discusses two-factor authentication, which is an underutilized security measure in businesses all over the world.
Josep AlborsDavid Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.
David Harley and Josep AlborsWith the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.
Josep AlborsESET's Josep Albors looks at how DNS attacks will try and direct you to fake pages.
Josep AlborsIf you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley.
David Harley and Josep AlborsThe term Fast Flux can refer to networks used by several botnets to hide the domains used to download malware or host phishing websites, says Josep Albors.
Josep AlborsUSBee is a form of "air gap attack". It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.
Josep AlborsCybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.
Sabrina Pagnotta and Josep AlborsOne of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.
Josep AlborsSome of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.
Josep AlborsESET's Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.
Josep AlborsThere is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET's Josep Albors.
Josep AlborsWeeks after it started attacking and encrypting victims' information, Locky is still targeting many users. Here's what you need to know about this threat.
Josep Albors and Raphael Labaca CastroIn this post, ESET's Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.
Josep Albors