Costco survey scam targets WhatsApp users
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is
Education: I studied Computer Engineering at the National Autonomous University of Mexico (UNAM).
Career Summary: I was part of UNAM-CERT, performing activities such as the implementation of safety standards and best practices, coordination of the Information Security Management System and computer security audits.
Position and history at ESET: In 2014 I joined the ESET Mexico local team as an Awareness & Research Specialist.
What is the malware you hate the most? The malware that is developed using sponsorship.
Favorite activities: Reading, playing sports and watching movies.
What is your golden rule in cyberspace? If something sounds too good to be true, it usually is.
When did you have your first computer and what type was it? In 2001, a Pentium 4 computer.
What is your favorite activity or game on the computer? My favorite activities on the web are reading technology news and politics. Also chatting. Despite the years, my favorite game is still Super Mario Bros. 3.
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is
Miguel Ángel MendozaThe principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity
Miguel Ángel MendozaTools for mining cryptocurrencies also fall into this category, as in many cases the websites cannot warn users since they have been compromised themselves, hence even the administrators may not be aware that they are contributing to mining for the benefit of an attacker.
Miguel Ángel MendozaIn 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.
Miguel Ángel MendozaIn a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.
Miguel Ángel MendozaThese factors can be key to the success or failure of the ISMS implementation, due to the day-to-day activities in the organization and the resources required for system operation.
Miguel Ángel MendozaESET's Miguel Ángel Mendoza discusses the right to privacy in the digital era, which is an increasingly important issue.
Miguel Ángel MendozaCybersecurity legislation: organization, collaboration and diffusion across the globe, and working towards the populization of cybersecurity culture
Miguel Ángel MendozaESET's Miguel Ángel Mendoza looks at a range of forensic analysis techniques that are used to examine digital images.
Miguel Ángel MendozaESET's Miguel Ángel Mendoza looks at why combining technology with standards could combat fraud.
Miguel Ángel MendozaThe security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers.
Miguel Ángel MendozaThe Global Cybersecurity Index (GCI) measures a nation's commitment to cybersecurity and encourages countries to take the issue more seriously.
Miguel Ángel MendozaIn this article, ESET's Miguel Ángel Mendoza asks: "At what age should kids be able to access online services?"
Miguel Ángel MendozaIn an era when children are becoming digital natives, using and understanding technology from an early age, safety risks that have existed for some time could also affect them, if we fail to take the necessary precautions.
Miguel Ángel MendozaBefore you jump into the virtualization migration process, there are a few things to consider, like security, explains ESET's Miguel Angel Mendoza.
Miguel Ángel MendozaThe search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.
Miguel Ángel MendozaAs part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.
Miguel Ángel MendozaA look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today's service for sale.
Miguel Ángel MendozaThis article looks at the core idea behind applying ISO 27001.
Miguel Ángel MendozaThis guide offers you five informative tips on how best to avoid ransomware in your email, which is a common way for extortion-based malware to propagate itself.
Miguel Ángel Mendoza