Camilo Gutiérrez Amaya

Camilo Gutiérrez Amaya

Head of Awareness & Research


Education: Degree in Electronic Engineering from Universidad de Antioquia (Colombia) and MSc (c) in Data Mining & Knowledge Discovery at Universidad de Buenos Aires (Argentina).

Highlights of your career? I studied two careers at Universidad de Antioquia and Universidad Nacional de Colombia. When I finished, I started working in security in financial institutions of my country.

Position and history at ESET? I started working at ESET in 2012 as an Awareness & Research Specialist. In 2016 I became Head of Awareness & Research for Latin America.

What malware do you hate the most? Adware

Favorite activities? Diving anhd climbing are two activities in which I could invest most of my free time.

What is your golden rule for cyberspace? There's a lot of information on the Internet, but a lot of it is fake, so don't believe in everything you read.

When did you get your first computer and what kind was it? I remember it was in 1994, a 386 computer with MS-DOS and Windows 3.1 interface.

Favorite computer game/activity? I used to spend hours playing Age of Empires, but now I use that time for searching and analyzing information about my study subjects.


18 articles by Camilo Gutiérrez Amaya

ESET research

Operation King TUT: The universe of threats in LATAM

Operation King TUT: The universe of threats in LATAM

ESET research

Operation King TUT: The universe of threats in LATAM

ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting

Camilo Gutiérrez Amaya and Fernando Tavella17 Oct 20233 min. read


Digital Security

Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

Digital Security

Top 5 search engines for internet-connected devices and services

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

Camilo Gutiérrez Amaya18 May 20233 min. read


World Cup watching: The common threats found when using streaming sites

World Cup watching: The common threats found when using streaming sites

World Cup watching: The common threats found when using streaming sites

On the eve of the 2018 FIFA World Cup in Russia, we take a closer look at the possible cybersecurity risks that exist on sports-streaming websites

Camilo Gutiérrez Amaya13 Jun 20184 min. read


Digital Security

Trends 2018: Democracy hack

Trends 2018: Democracy hack

Digital Security

Trends 2018: Democracy hack

Can the electoral processes be protected?

Camilo Gutiérrez Amaya18 Apr 20184 min. read


Cybercrime

Security education and social responsibility

Security education and social responsibility

Cybercrime

Security education and social responsibility

We look at key trends for 2017 within this sector, from password security to the need for security education at all institutions: schools, businesses, governments.

Camilo Gutiérrez Amaya04 May 20179 min. read


Fake Chrome extensions inject code into web pages

Fake Chrome extensions inject code into web pages

Fake Chrome extensions inject code into web pages

Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected, says Camilo Gutiérrez Amaya.

Camilo Gutiérrez Amaya28 Apr 20173 min. read


Digital Security

ESET Trends for 2017: Holding security ransom

ESET Trends for 2017: Holding security ransom

Digital Security

ESET Trends for 2017: Holding security ransom

ESET’s Trends for 2017: Security Held Ransom report includes a review of the most important events of last year and outlines trends in cybercriminal activity and cyberthreats for 2017.

Camilo Gutiérrez Amaya15 Dec 20165 min. read


Privacy

Types of VPN networks and how they work: do you know which kind to use?

Types of VPN networks and how they work: do you know which kind to use?

Privacy

Types of VPN networks and how they work: do you know which kind to use?

WeLiveSecurity delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?

Camilo Gutiérrez Amaya07 Jul 20164 min. read


Ransomware

Ransomware: First files ... now complete devices

Ransomware: First files ... now complete devices

Ransomware

Ransomware: First files ... now complete devices

Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.

Camilo Gutiérrez Amaya07 Jul 20167 min. read