Cecilia Pastorino

Cecilia Pastorino

Security Researcher


Education? Studied Networking and Communication at Palermo University. CCNA and CCNP Cisco certifications and Certified Ethical Hacker (CEH).

Highlights of your career? I worked for almost 10 years in Infrastructure and specialized in network security. In 2012 I got in charge of the information security area of a company in the healthcare industry, where I developed the “Information Security Management System” and certified ISO 27001.

Position and history at ESET? First met ESET in 2013 when I joined Argentina Cibersegura as a volunteer. In January 2017 I became a Security Researcher in ESET Latin America.

What malware do you hate the most? Trojans, because they take advantage of unwary users.

Favorite activities? Travelling, meeting new people and places all over the world. Also amateur photography and rollerskating.

What is your golden rule for cyberspace? Don’t believe everything you see on the Internet. Be careful, the information you share online may be used against you.

When did you get your first computer and what kind was it? It was an Apple II Plus that belonged to my dad before I was born. My mom used to program games for me in the Apple, and I used it for several years until I got my first IBM with Windows 3.11.

Favorite computer game/activity? Investigate, try, break and learn. I also like scape games and all kind of logic games. Wholehearted fan of Carmen Sandiego and Monkey Island.


14 articles by Cecilia Pastorino

Scams

Think before you scan: How fraudsters can exploit QR codes to steal your money

Think before you scan: How fraudsters can exploit QR codes to steal your money

Scams

Think before you scan: How fraudsters can exploit QR codes to steal your money

QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.

Cecilia Pastorino04 Feb 20225 min. read


ESET research

Sex in the digital era: How secure are smart sex toys?

Sex in the digital era: How secure are smart sex toys?

ESET research

Sex in the digital era: How secure are smart sex toys?

ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things

Denise Giusto Bilić and Cecilia Pastorino11 Mar 202110 min. read


Privacy

3 ways to browse the web anonymously

3 ways to browse the web anonymously

Privacy

3 ways to browse the web anonymously

Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online

Cecilia Pastorino21 Jan 20204 min. read


Kids Online

Cyberbullying: What schools and teachers can do

Cyberbullying: What schools and teachers can do

Kids Online

Cyberbullying: What schools and teachers can do

How schools and educators can address and help prevent abusive behavior on the internet

Cecilia Pastorino23 Aug 20195 min. read


Privacy

Blockchain: What is it, how it works and how it is being used in the market

Blockchain: What is it, how it works and how it is being used in the market

Privacy

Blockchain: What is it, how it works and how it is being used in the market

A closer look at the technology that is rapidly growing in popularity

Cecilia Pastorino09 Oct 20185 min. read


Secure Coding

Programmer's Day: Resources to audit your code

Programmer's Day: Resources to audit your code

Secure Coding

Programmer's Day: Resources to audit your code

Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code

Cecilia Pastorino13 Sep 20184 min. read


UNICEF now using cryptocurrency mining for fundraising

UNICEF now using cryptocurrency mining for fundraising

UNICEF now using cryptocurrency mining for fundraising

So far in 2018, the NGO has launched two charity campaigns with the aim of raising funds through cryptocurrency mining.

Cecilia Pastorino29 May 20185 min. read


Controlling children's use of technology: a preventive measure or an invasion of privacy?

Controlling children's use of technology: a preventive measure or an invasion of privacy?

Controlling children's use of technology: a preventive measure or an invasion of privacy?

How to use parental control apps to protect children and the fine line that exists between controlling the use of technology and invasion of privacy

Cecilia Pastorino01 May 20185 min. read


How To

How to start analyzing the security of your IoT devices

How to start analyzing the security of your IoT devices

How To

How to start analyzing the security of your IoT devices

The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.

Cecilia Pastorino02 Mar 20183 min. read