Ondrej Kubovič

Ondrej Kubovič

Security Evangelist


Education: Bc. in Journalism, Master's Degree in Political Science

Highlights of your career: Working for Slovak media for seven years, focusing on IT security, homeland security and defense matters. Managing media department at Bratislava-based security conferenceGLOBSEC.

Position and history at ESET: Joined ESET as a Security Specialist in September 2015. Fresh, new and eager to work.

What malware do you hate the most? The one my family downloads and I have to remove.

Favorite activities: Freeride snowboarding, meeting new people, reading and, as boring as it sounds, traveling.

Golden rule for cyberspace? Backup, update and never go on a clicking spree.

When did you get your first computer and what kind was it? I think it was in 1994 – 286 with MS-DOS preinstalled. There was no monitor available, so we could only use it when nobody was watching the TV.

Favorite computer game / activity: Classics such as Counter-Strike or the Call of Duty series. But what I do most on my computer is browse the web looking for interesting stuff.


77 articles by Ondrej Kubovič

Privacy

Buying encryption? Five good questions to ask before you do

Buying encryption? Five good questions to ask before you do

Privacy

Buying encryption? Five good questions to ask before you do

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption.

Ondrej Kubovič17 Aug 20174 min. read


Avoid getting lost in encryption with these easy steps

Avoid getting lost in encryption with these easy steps

Avoid getting lost in encryption with these easy steps

Encryption can be the answer to many data security issues faced by small and medium businesses. Apart from protecting sensitive information from unauthorized use,this technology can also represent another step towards compliance with legislation.

Ondrej Kubovič10 Aug 20173 min. read


Cybercrime

How black-hats misuse the torrent ecosystem for fun and profit

How black-hats misuse the torrent ecosystem for fun and profit

Cybercrime

How black-hats misuse the torrent ecosystem for fun and profit

Torrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.

Ondrej Kubovič01 Aug 20173 min. read


Digital Security

Machine learning by ESET: The road to Augur

Machine learning by ESET: The road to Augur

Digital Security

Machine learning by ESET: The road to Augur

Machine learning (ML) in eight blogposts!? In our last post, let’s take a peek under the hood of ESET’s cybersecurity engine and its ML gears.

Ondrej Kubovič20 Jun 20176 min. read


Ransomware

ESET releases decryptor for AESNI ransomware variants, including XData

ESET releases decryptor for AESNI ransomware variants, including XData

Ransomware

ESET releases decryptor for AESNI ransomware variants, including XData

ESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET's utilities page.

Ondrej Kubovič31 May 20171 min. read


Ransomware

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

Ransomware

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

ESET have prepared a new Crysis decrypting tool. Victims who still have their encrypted files can now download the decryptor from its utilities page.

Ondrej Kubovič22 May 20172 min. read


Ransomware

WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak

WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak

Ransomware

WannaCryptor wasn’t the first to use EternalBlue: Miners misused it days after Shadow Brokers leak

The massive campaign that spread the WannaCry ransomware wasn’t the only large-scale infection misusing the EternalBlue and DoublePulsar exploits.

Ondrej Kubovič17 May 20172 min. read


Digital Security

Security updates belong in the limelight, not in the dustbin of history

Security updates belong in the limelight, not in the dustbin of history

Digital Security

Security updates belong in the limelight, not in the dustbin of history

Without regular security updates, your endpoint will be left standing alone against an entire army of cybercriminals who see you as easy prey.

Ondrej Kubovič16 May 20174 min. read


Digital Security

False positives can be more costly than a malware infection

False positives can be more costly than a malware infection

Digital Security

False positives can be more costly than a malware infection

Poor business decisions can be very costly, especially in cybersecurity, where so-called false positives can have very damaging consequences.

Ondrej Kubovič09 May 20175 min. read