Author
Righard Zwienenberg
Righard Zwienenberg
Senior Research Fellow

Education: Yes

Highlights of your career? Being in the business for 25 years in August 2013.

What malware do you hate the most? Data destroyers.

Favorite activities? Drums, magic, squash.

What is your golden rule for cyberspace? Practice Safe Hex.

When did you get your first computer and what kind was it? 1979, Commodore PET 2001.

Favorite computer game/activity? Jumpman (C=64).

More Info

The Billgate Foundation – the fall for money, eh many…

Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this is the time to dust off and polish the good old Microsoft Lottery scam and update it.

Radar Love: how classic rock helps to highlight Java problems

Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring’s Radar Love shows off problems that can leave users at the mercy of Java attacks.

From BYOD to CYOD: Security issues with personal devices in the workplace

The hottest IT trend in the workplace right now is definitely BYOD: Bring Your Own Device. This is popular with employees who regard it as a convenient way to read private e-mail and to browse to (work-unrelated) sites at the office, and moreover as a way to work for their employer on a device they

Scandal video of Justin Bieber: just don’t click here!

I received a “shared” messages from a friend about “a leaked scandal video of Justin Bieber and Selana Gomez” promising a “naked Justin Bieber”, with a Photoshopped picture, which we – for family-friendliness – censored a bit.

Combofix: a cocktail of infective factors

In various blog-posts, users have been encouraged by ESET experts to download applications from the official website for that application, as you never know what might have happened to the software when you download it from a mirror site or a download site.

Advanced Heuristics

When something in your vicinity happens, you know right away if it is good or right. When the traffic light on a busy road is red, you know not to cross and when it is green you can cross, but still be looking around to see if it is safe. With different instances that are

Why Anti-Virus is not a waste of money

It has happened before, it just happened again and it will happen in the future. It is inevitable! Some company that needs to get some press coverage or public visibility will release yet another statement on how worthless Anti-Virus is, based on its own dysfunctional test. For this “test”, they used the VirusTotal service. VirusTotal

Scareware on the Piggy-Back of ACAD/Medre.A

There are always people who want to piggy-back on the achievements of others. After ESET warned the public against ACAD/Medre.A in two blogs here and here  and issued a free standalone cleaner for remediation, there was always the possibility that drawing attention to the issue would result in the topic being misused for other purposes.

ACAD/Medre.A 10000’s of AutoCAD files leaked in suspected industrial espionage

The malware news today is all about new targeted, high-tech, military grade malicious code such as Stuxnet, Duqu and Flamer that have grabbed headlines. So imagine our surprise when an AutoCAD worm, written in AutoLISP, the scripting language that AutoCAD uses, suddenly showed a big spike in one country on ESET’s LiveGrid® two months ago,

DNS Changer (re)lived, new deadline: 9 July 2012!

As written in our “Password management for non-obvious accounts” blog post on February 22, the FBI confiscated the DNS Servers used by the DNS Changer malware and replaced them with different servers so that infected users would not be left without internet right away. Initially these replacement DNS Servers were to be taken offline on

Phishing Using HTML and Intranet Security Settings

Phishers always try to find new ways to bypass security features and trick ‘educated’ users. Over the years we have seen simplistic phishing attempts where the required information had to be typed into the e-mail body. This worked at that time because phishing was new and hardly anyone had a notion of the implications. Later,

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

Malicious software that gets updates from a domain belonging to the Eurasian state of Georgia? This unusual behavior caught the attention of an analyst in ESET's virus laboratory earlier this year, leading to further analysis which revealed an information stealing trojan being used to target Georgian nationals in particular. After further investigation, ESET researchers were

The security of unlocking an Android based device, the future is near?

In a recent survey of people in America who use their smartphone for work, less than a third said they employ the password protection on their smartphones. Although everyone will agree that not protecting your smartphone isn’t smart, it is all about memorizing.  Everyone that has an Android-based device knows they do not have to

SKYPE: (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications

SKYPE: Securely Keep Your Personal E-communications From time to time people get new computer equipment and need to (re-)install all their favorite programs. Often a painful and time-consuming job, but afterwards it should ease the way of working with the new equipment. Even security gurus have to undergo this procedure at regular intervals. In November

Password management for non-obvious accounts

A continuation on: Time to check your DNS settings? After 7 March 2012, lots of people potentially can be hit as their systems are infected by a DNS Changer. Several government-CERTs have already warned their users. Rather than using the ISP’s DNS Servers, the malware has changed the settings to use DNS Servers controlled by

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.