search results

What Pippa Middleton can teach us about iCloud security

...ccessed on devices you trust, like your iPhone, iPad, or Mac...ime on a newly purchased Mac, you'll be prompted to e...

Book of Eli: African targeted attacks

This blog post describes details that we discovered during our analysis of malware that focuses on a specific country — Libya. The malware has existed since at least 2012, with threat...

Snowden: 4 big security and privacy assumptions he undermined

Oliver Stone’s movie about Edward Snowden, which opens on Friday, September 16th, 2016, has a lot of people looking back at one of the biggest information security breaches in US...

How to avoid certificate pinning in the latest versions of Android

We previously explained how to construct an analysis environment enabling the certificate pinning process to be bypassed in Android applications, in order to be able to examine network traffic and to...

School ransomware: A threat to be aware of

...hallenge, as an untold number of unmanaged machines are c...

11 things you can do to protect against ransomware, including Cryptolocker

...ansomware can get onto a person’s machine, but as always, t...ilently install on a victim’s machine. Why is Cry...oint, tens of thousands of machines have been a...

18 years of Googling: Malware can still be just one click away

...ecurity software – your machine can end up infected, y...

VMworld: The year of the developer

... way that other teams and machines can consume, u...

VMworld: Can you trust your API?

...here must be a common way in which various machines c...an request – and sometimes direct – other machines t...n interface designed to be simple for machines to ef...

OSX/Keydnap spreads via signed Transmission application

Last month ESET researchers wrote an article about a new OS X malware called OSX/Keydnap, built to steal the content of OS X’s keychain and maintain a permanent backdoor. At...

Follow us

Copyright © 2016 ESET, All Rights Reserved.