Author
Miguel Ángel Mendoza
Miguel Ángel Mendoza
Security Researcher
Go to latest posts

The right to privacy in the digital era

ESET’s Miguel Ángel Mendoza discusses the right to privacy in the digital era, which is an increasingly important issue.

Challenges and implications of cybersecurity legislation

Cybersecurity legislation: organization, collaboration and diffusion across the globe, and working towards the populization of cybersecurity culture

Forensic analysis techniques for digital imaging

ESET’s Miguel Ángel Mendoza looks at a range of forensic analysis techniques that are used to examine digital images.

Why combining technology with standards could combat fraud

ESET’s Miguel Ángel Mendoza looks at why combining technology with standards could combat fraud.

The cybercrime business model and its value chain

The security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers.

How do you work out a country’s level of cybersecurity?

The Global Cybersecurity Index (GCI) measures a nation’s commitment to cybersecurity and encourages countries to take the issue more seriously.

At what age should kids be able to access online services?

In this article, ESET’s Miguel Ángel Mendoza asks: “At what age should kids be able to access online services?”

Online grooming: A threat to minors that demands our attention

In an era when children are becoming digital natives, using and understanding technology from an early age, safety risks that have existed for some time could also affect them, if we fail to take the necessary precautions.

Managing security in virtualized environments – agent-based or agentless?

Before you jump into the virtualization migration process, there are a few things to consider, like security, explains ESET’s Miguel Angel Mendoza.

Why continuous vulnerability assessments are necessary

The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.

The most frequent threats on email

As part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.

The evolution of ransomware: From PC Cyborg to a service for sale

A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today’s service for sale.

What is the core idea behind applying ISO 27001?

This article looks at the core idea behind applying ISO 27001.

5 practical tips to avoid ransomware in your email

This guide offers you five informative tips on how best to avoid ransomware in your email, which is a common way for extortion-based malware to propagate itself.

Is it really the end for password authentication?

Passwords as a method of authentication may be seeing their end of days. But what’s a realistic alternative to our old, alphanumeric security standby? Biometrics? Or perhaps two-factor authentication can play a role?

Follow us

Copyright © 2017 ESET, All Rights Reserved.