Roman Cuprik

Roman Cuprik

Content Writer


Education?
M.A. in Journalism

Position and history at ESET?
I joined ESET in 2023 as a content writer.

What malware do you hate the most?
Ransomware that attacks particularly vulnerable facilities such as hospitals and thus threatens human lives and health.

Favorite activities?
Fitness, running, reading, and gaming.

What is your golden rule for cyberspace?
Healthy paranoia.

When did you get your first computer and what kind was it?
As a child I played games on my father’s computers. I only remember that the oldest one run Windows 95. My first ever computer was Lenovo ThinkPad that I got back in the 2000s.

Favorite computer game/activity?
I am huge fan of historical strategic games and RPGs with a good story.


12 articles by Roman Cuprik

Mobile Security

These aren’t the Androids you should be looking for

These aren’t the Androids you should be looking for

Mobile Security

These aren’t the Androids you should be looking for

You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play

Roman Cuprik and Thomas Uhlemann20 Dec 20237 min. read


Scams

Read it right! How to spot scams on Reddit

Read it right! How to spot scams on Reddit

Scams

Read it right! How to spot scams on Reddit

Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”?

Roman Cuprik13 Sep 20237 min. read


Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Getting off the hook: 10 steps to take after clicking on a phishing link

Scams

Getting off the hook: 10 steps to take after clicking on a phishing link

Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.

Roman Cuprik04 Sep 20236 min. read


Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Business Security

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software

Roman Cuprik28 Aug 20237 min. read


Internet of Things

Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Internet of Things

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 20234 min. read


Scams

Dear all, What are some common subject lines in phishing emails?

Dear all, What are some common subject lines in phishing emails?

Scams

Dear all, What are some common subject lines in phishing emails?

Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.

Roman Cuprik25 Jul 20237 min. read


Mobile Security

7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

Mobile Security

7 tips for spotting a fake mobile app

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future

Roman Cuprik06 Jun 20238 min. read


Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

Roman Cuprik30 May 20234 min. read


Digital Security

Meet “AI”, your new colleague: could it expose your company's secrets?

Meet “AI”, your new colleague: could it expose your company's secrets?

Digital Security

Meet “AI”, your new colleague: could it expose your company's secrets?

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

Roman Cuprik17 May 20236 min. read