search result

Millions of computers left vulnerable to BIOS chip hack

A vulnerability has been detected in the BIOS chips found in millions of computers which could leave users open to hacking.

NSA saves world from plot to “remotely destroy” PCs, claims NSA director

An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the NSA, according to an interview given to CBS by NSA director Keith Alexander. The attack could have “taken down the U.S. economy”, an NSA official claimed.

Rakshasa hardware backdooring: the demon that can't be exorcized?

Jonathan Brossard describes an ‘undetectable, unremovable’ attack on firmware through gimmicked hardware or a subsequent malware attack. David Harley isn’t convinced.

Windows 8: Significant Changes and Security Issues

Aryeh Goretsky discusses the transition from BIOS firmware to UEFI for implementing Secure Boot under Windows 8.

Win32/Gapz: New Bootkit Technique

Win32/Gapz’s new bootkit technique modifies just 4 bytes of the original VBR, has an enhanced dropper and complex kernel mode functionality, and evades ELAM.

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.

Scary Code: Top 5 malware that kept researchers up at night

If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.

A white paper: Windows 8’s Security Features

[NOTE: For the latest information about compatibility between ESET’s software and Windows 8, please see the following blog post: W8ing for V6: What ESET has in store for Windows 8 Users. (10/23/2012, 4:15PM)] Windows 8 will be available to the public in three weeks, and interest in the latest version of Microsoft’s flagship operating system

Ransomware: Expert advice on how to keep safe and secure

ESET’s Lysa Myers offers a detailed and comprehensive overview on how to stay safe against ransomware attacks, a threat that is growing in prominence.

School ransomware: A threat to be aware of

Ransomware that targets schools is a threat that needs to be understood, explains ESET’s Lysa Myers. Top cybersecurity efforts are needed to keep it at bay.

Lenovo disables ‘unremovable software’

Lenovo has announced that LSE,a virtually unremovable software, is no longer being installed on its products.

What I learned at Cyber Boot Camp this summer: 7 lessons

The annual Cyber Boot Camp in San Diego aims to develop the skills, mindset, and moral code required defend networks against criminal abuse. Here are just seven of the many lessons students learned at this year’s event.

Vulnerability found in AMD processor firmware

A vulnerability found in certain AMD processor firmware has been patched by the company it was revealed at the 31st Chaos Communication Congress.

Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication

The mysterious Avatar rootkit, detected by ESET as Win32/Rootkit.Avatar, appears to reflect a heavy investment in code development, with an API and a SDK available, plus an interesting abuse of Yahoo Groups for C&C communications.

Security Through Obscurity

In techie circles bringing up the topic of security through obscurity is like bringing up religion or politics at a cocktail party where you don’t know anybody. It might go over really well, or you might find people calling you names that my friends in HR would chastise (or fire) me for printing in the

Prince Charming: The Valentine’s Day scammer

In this feature, we highlight some of the key tactics used by cybercriminals via online dating websites, helping you stay safe on Valentine’s Day.

What I learned at Cyber Boot Camp (Instructor Edition)

Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.

Google’s Project Zero reveals possible memory leak hack

Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Future malware might offer real functions to avoid detection

Malware may begin to offer genuinely helpful functionality in the future, in order to “fly under the radar” and fake legitimacy before striking, according to Professor Giovanni Vigna from the University of California.

Copyright © 2017 ESET, All Rights Reserved.