ESET Trends 2016 – (In)security Everywhere

“Security is no longer just a problem for a few individuals but rather a problem involving more and more people”, explains ESET Research Laboratories in its annual trends paper. “2016 will be a most challenging year. We must face it with a proactive attitude of security awareness. “

Windows Exploitation in 2015

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.

Windows 10: Should you go there?

Windows 10: Should you go there?

How Safe are Australian Children in the Internet Age?

How Safe are Australian Children in the Internet Age?

Is Anti-Virus dead?

Is Anti-Virus dead?

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Liberpy’: Keyloggers and information theft in Latin America

Operation Liberpy’: Keyloggers and information theft in Latin America

Dissecting Linux/Moose

The Analysis of a Linux Router-based Worm Hungry for Social Networks

CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails

CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails

Unboxing Linux/Mumblehard

Linux/Mumblehard is a family of malware targeting servers running both the Linux and BSD operating systems.

Trends for 2015 – Targeting the Corporate World

The “Trends For 2015 – Targeting the Corporate World” report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to consider and present the challenges and threats expected for 2015.

Windows Exploitation in 2014

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2014.

IT Security Lessons Learned in 2014

These are the slide from a webinar titled Make 2015 More Secure: Lessons from 2014, which was a follow-up to the 2014 Mid-Year Threat Report webinar from this summer.

Don’t Forget to Write

A review for Virus Bulletin of two recent eBooks that aim to provide security guidance and tips to consumers.

View more

Operation Windigo report

The vivisection of a large Linux server-side credential stealing malware campaign.

Did you say “Advanced” Persistent Threats?

The analysis of four not-so-advanced persistent threats that targeted Vietnam and Taiwan.

ESET Threat Trends Predictions for 2014: The Challenge of Internet Privacy

ESET, the global leader in proactive digital protection with a record 10 years of consecutive VB100 awards for its ESET NOD32 technology, has released today its annual predictions for the threatscape in the upcoming year “Trends 2014 – The Challenge of Internet Privacy”.

Chronology of a Skype Attack: The Rodpicom Worm Propagation

Pablo Ramos, Security Researcher for Latin America together with his colleagues, has looked into the chronology of a Skype attack. They have captured their investigation in a dedicated White Paper named Chronology of a Skype Attack: The Rodpicom Worm Propagation.

Windows 8.1 – security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1″ point release of Windows 8. The white paper also discusses new risks introduced by Windows 8.1, and looks at whether or not IT shops and users should upgrade.

Hesperbot – A New, Advanced Banking Trojan in the Wild

A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.

Follow us

Copyright © 2016 ESET, All Rights Reserved.