The question of antivirus software being dead is one that doesn’t seem to go away. Why is that? Distinguished ESET researcher Aryeh Goretsky explores.
Ghosts, monsters and the living dead can all send a chill down one’s spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece of Android malware known as DroidJack.
A new malware identified as YiSpecter attacks iOS devices with and without jailbreak, researchers from Palo Alto Networks have revealed. ESET has detected this malware as a trojan with both variants iOS/YiSpecter.A and iOS/YiSpecter.B.
Apple has removed more than 300 malicious apps after confirming the first major breach to its iOS app store.
A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today’s service for sale.
The latest ESET discovery of the first known Android lock-screen-type ransomware that spreads in the wild and sets the phone’s PIN lock is examined.
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?