You are the weakest link…

Greetings, friends and fiends.

It's been a while since I've been able to blog: I've been trying out one of these vacation thingies that I keep reading about in travel magazines. (Well, my wife does, and she tells me when I need a holiday, presumably as my conversations get grouchier.) But I see that my colleagues in the Research team have keeping you well supplied with reading material.

Another of my colleagues, Juraj Malcho, Head of Lab in Slovakia, the engine room of our product line, has also been busy on the writing front (I don't know how he fits it in with all that other work). In an article for CTO Edge, he talks about the use of social engineering in malware. Social engineering and malware have been enjoying a dangerous liaison for a long time, of course, but it's never a bad time ot point out that psychological manipulation remains the most successful vector for malware infection (and other attacks, of course), and the article includes some very apposite examples of the technique.

And dare I mention that it's platform-independent?

Director of Malware Intelligence

ESET Threatblog (TinyURL with preview enabled):
ESET Threatblog notifications on Twitter:;
ESET White Papers Page:

Securing Our eCity community initiative:

Also blogging at:

Author David Harley, ESET

Follow us

Copyright © 2015 ESET, All Rights Reserved.