Award-winning news, views, and insight from the ESET security community

    EspañolDeutschPortuguêsFrançais
  • TIPS & ADVICE

  • BUSINESS SECURITY

  • ESET RESEARCH
    About ESET ResearchBlogpostsPodcastsWhite papersThreat reports

  • WeLiveScience

  • FEATURED
    Ukraine crisis – Digital security resource centerWeLiveProgressCOVID-19ResourcesVideos

  • TOPICS
    Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research

  • ABOUT US
    About WeLiveSecurityOur ExpertsContact Us

  • English
    EspañolDeutschPortuguêsFrançais

Award-winning news, views, and insight from the ESET security community

Ignacio Pérez

Ignacio Pérez

Security Researcher


Latest Articles

The role of proxies and protocols in malware investigations

The role of proxies and protocols in malware investigations

Less Technical

Botnets: remote controls for cybercriminals

Botnets: remote controls for cybercriminals


2 articles by Ignacio Pérez

The role of proxies and protocols in malware investigations

The role of proxies and protocols in malware investigations

The role of proxies and protocols in malware investigations

What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

Ignacio Pérez • 23 Jun 2015 • 5 min. read


Less Technical

Botnets: remote controls for cybercriminals

Botnets: remote controls for cybercriminals

Less Technical

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

Ignacio Pérez • 20 Oct 2014 • 3 min. read


Award-winning news, views, and insight from the ESET security community

About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed
Copyright © ESET, All Rights Reserved