Jean-Ian Boutin: Banking trojan threat is not going anywhere

In an exclusive for WeLiveSecurity, Jean-Ian Boutin, a malware researcher at ESET, shares his thoughts on the past, present and future of banking trojans.

Lightbulb moment: Why the Internet of Things is a security watershed

Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.

Aryeh Goretsky talks “very promising” Windows 10 security

Windows expert Aryeh Goretsky discusses threats to Windows past, present and future. Will Windows 10 mean hackers have to work harder?

How did the Internet change the everyday work of a security researcher?

Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.

David Harley: “New scams are difficult to spot even for a trained eye”

Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.

ESET’s Mark James on addressing business security employee issues

ESET’s Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety.

Lysa Myers: “There are still only a handful of women in the security field”

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

Operation Windigo: “Good job, ESET!” says malware author

Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

Interview: Phil Zimmermann – why Fortune 100 companies are buying Blackphone

Phil Zimmermann invented the most widely used system of email encryption in the world – and says that Fortune 100 companies are queuing up for his encrypted Blackphone, which allows “whispered” conversations, anywhere.

Interview: Windigo victim speaks out on the ‘stealth’ malware that attacked his global company

Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers – victims for the gang. Gagnon didn’t notice for weeks, until complaints from customers alerted him. A team of ESET experts contained the infection, and Gagnon’s help with forensics was also valuable.

The ‘Digital Guardian': IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure

Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.

Infosecurity Magazine on AMTSO's credibility gap

I was interviewed yesterday by Fred Donovan, following up on the paper on AMTSO I presented at EICAR earlier this month. I may be prejudiced, but I think he's summarized my current  thoughts on the topic pretty well in the article, though it isn't my recommendation that the existing guidelines be reviewed independently: it was

Turkish Delight (2)

This is part two of a recent email interview with a Turkish web site, with part one made available here for the benefit of those of us who don’t speak Turkish.  I’ve done a little editing on parts one and two, primarily for cosmetic reasons. Question (4): What the golden rules for using the Internet with

Turkish Delight

So, back in harness. I’ve been away for a couple of weeks: not on holiday as such, though I did take some days out, but concentrating on writing: it didn’t hurt that I didn’t have a full-strength internet connection to distract me, though. Before I left, I was interviewed by a Turkish security site. It

Follow us

Copyright © 2015 ESET, All Rights Reserved.