category
Interview

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

Operation Windigo: “Good job, ESET!” says malware author

Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

Interview: Phil Zimmermann – why Fortune 100 companies are buying Blackphone

Phil Zimmermann invented the most widely used system of email encryption in the world – and says that Fortune 100 companies are queuing up for his encrypted Blackphone, which allows “whispered” conversations, anywhere.

Interview: Windigo victim speaks out on the ‘stealth’ malware that attacked his global company

Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers – victims for the gang. Gagnon didn’t notice for weeks, until complaints from customers alerted him. A team of ESET experts contained the infection, and Gagnon’s help with forensics was also valuable.

The ‘Digital Guardian': IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure

Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.

Infosecurity Magazine on AMTSO's credibility gap

I was interviewed yesterday by Fred Donovan, following up on the paper on AMTSO I presented at EICAR earlier this month. I may be prejudiced, but I think he's summarized my current  thoughts on the topic pretty well in the article, though it isn't my recommendation that the existing guidelines be reviewed independently: it was

Turkish Delight (2)

This is part two of a recent email interview with a Turkish web site, with part one made available here for the benefit of those of us who don’t speak Turkish.  I’ve done a little editing on parts one and two, primarily for cosmetic reasons. Question (4): What the golden rules for using the Internet with

Turkish Delight

So, back in harness. I’ve been away for a couple of weeks: not on holiday as such, though I did take some days out, but concentrating on writing: it didn’t hurt that I didn’t have a full-strength internet connection to distract me, though. Before I left, I was interviewed by a Turkish security site. It

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.