Author
Ondrej Kubovič
Ondrej Kubovič
Security Evangelist
Go to latest posts

Education: Bc. in Journalism, Master's Degree in Political Science

Highlights of your career: Working for Slovak media for seven years, focusing on IT security, homeland security and defense matters. Managing media department at Bratislava-based security conferenceGLOBSEC.

Position and history at ESET: Joined ESET as a Security Specialist in September 2015. Fresh, new and eager to work.

What malware do you hate the most? The one my family downloads and I have to remove.

Favorite activities: Freeride snowboarding, meeting new people, reading and, as boring as it sounds, traveling.

Golden rule for cyberspace? Backup, update and never go on a clicking spree.

When did you get your first computer and what kind was it? I think it was in 1994 – 286 with MS-DOS preinstalled. There was no monitor available, so we could only use it when nobody was watching the TV.

Favorite computer game / activity: Classics such as Counter-Strike or the Call of Duty series. But what I do most on my computer is browse the web looking for interesting stuff.

Android ransomware in 2017: Innovative infiltration and rougher extortion

Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.

Buying encryption? Five good questions to ask before you do

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption.

Avoid getting lost in encryption with these easy steps

Encryption can be the answer to many data security issues faced by small and medium businesses. Apart from protecting sensitive information from unauthorized use,this technology can also represent another step towards compliance with legislation.

How black-hats misuse the torrent ecosystem for fun and profit

Torrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.

Machine learning by ESET: The road to Augur

Machine learning (ML) in eight blogposts!? In our last post, let’s take a peek under the hood of ESET’s cybersecurity engine and its ML gears.

ESET releases decryptor for AESNI ransomware variants, including XData

ESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET’s utilities page.

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

ESET have prepared a new Crysis decrypting tool. Victims who still have their encrypted files can now download the decryptor from its utilities page.

WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak

The massive campaign that spread the WannaCry ransomware wasn’t the only large-scale infection misusing the EternalBlue and DoublePulsar exploits.

Security updates belong in the limelight, not in the dustbin of history

Without regular security updates, your endpoint will be left standing alone against an entire army of cybercriminals who see you as easy prey.

False positives can be more costly than a malware infection

Poor business decisions can be very costly, especially in cybersecurity, where so-called false positives can have very damaging consequences.

A single protective technology means a single point of failure

A single protective technology means a single point of failure. A company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies.

Machine learning and math can’t trump smart attackers

Machine learning alone is not enough to protect endpoints and predicting an attacker’s next moves. Other security solutions and human input are needed.

When PR and reality collide: The truth about machine learning in cybersecurity

Machine learning (ML) is routinely cited by post-truth vendors as their biggest selling point, their main advantage. But ML – if it’s done properly – comes with problems and limitations.

Don’t buy the elixir of youth: Machine learning is not magic

There is no magic in machine learning. It’s a field of computer science that gives computers the ability to find patterns in huge amounts of data.

Fighting post-truth with reality in cybersecurity

Welcome to the beginning of a new series of short articles focused on the currents state of AI, all the ins and outs of machine learning, and how it affects cybersecurity.

It’s time to finally say goodbye to Windows XP. And Vista. Again

Three years ago, Microsoft ended its extended support for Windows XP. Today, almost 8% of desktop users worldwide are still run the operating system.

16 years of Mac OS X: Secure but not invincible to malware

Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100% malware-proof.

Trends in Android ransomware

2016 saw interesting developments within the Android ransomware scene. Ransomware emerged as one of the most pressing cybersecurity issues on the mobile platform.

Worrying about data privacy isn’t enough: Here’s how to own your online presence

As Data Privacy Day is upon us, we thought it apt to put together some top tips on how to manage and secure your online information.

Ray-Bans out, Uggs in: Holiday season scam plagues social media

A new holiday season scam campaign is plaguing social media – and this time it’s pretending to sell heavily discounted Uggs, reports ESET’s Ondrej Kubovič.

Follow us

Copyright © 2018 ESET, All Rights Reserved.