tag
ESET

Desafio 18: ¡Ganate una entrada a la Eko Party!

Saludos a todos, el día de hoy les traemos un desafío distinto a los que solemos presentar en este blog. No solo porque se trata de un desafío en linea, sino también porque los primero 2 ganadores se llevarán una entrada gratuita a la Ekoparty cada uno, uno de los eventos de seguridad más grandes

Nueva generación de botnets: TDL4 / TDSS

Como sabemos, cada cierto tiempo (cada vez menor) el nivel de sofisticación del malware aumenta. Nuevas técnicas y métodos de evasión y de propagación son desarrolladas por los creadores de malware día a día. Luego de que el famoso gusano Stuxnet fuera descubierto a mediados del año pasado y su complejo funcionamiento e intenciones fueron

Hungary starving for security awareness?

My colleagues in Hungary have released some slightly alarming statistics about malware awareness in their part of the world. Research carried out on their behalf by NRC suggests that a significant proportion of Hungarian Internet users don't even know what AV software is installed on their computer (or, presumably, if anything is installed.) http://www.eset.hu/hirek/holgyek-tessek-vedekezni?back=%2Fhirek Out

Twitter Relationship Counselling

Dear Twitter, I'm afraid our relationship is just not working these days: in fact, we seem to have stopped communicating almost immediately you cosied up to our mutual friend Tweetdeck. Clearly, I'm the spare part in this relationship, since Tweetdeck isn't talking to me much, either. How can you treat me like this? Since I'm

Social engineers don’t care about your OS: and nor should you

Security companies in general and, unfortunately, anti-malware companies in particular, are often accused of ‘hyping’ threats because of a perceived self-interest. However, in the main, legitimate vendors and researchers like those at ESET typically try to resist overhyping or playing up threats where possible, in favor of more balanced discussion that can help customers take

Don’t they know it’s the end of the world?*

*http://en.wikipedia.org/wiki/Skeeter_Davis  Here in the UK it's just turned 6pm on the 21st May, which apparently means I'll shortly be either invited to a rapturous celestial street party or subjected to various unpleasant experiences starting with a giant earthquake and ending with a front seat at a subterranean bonfire on or before 21st October. Though according to

Osama bin Laden is alive and well… on Facebook

The death of Osama bin Laden has gone viral, with blogs, social media and search engines pumping terabytes of rumor, innuendo and conspiracy theories at the speed of light, along with the occasional kilobyte of truth.  As the number of people searching for pictures and videos of bin Laden’s execution has skyrocketed, the criminal syndicates

Global malware thrives on the demise of a global terrorist

[NOTE:  As we were publishing this articl, our Latin American office discovered another Black Hat SEO campaign incorporating promises of Osama bin Laden videos on Facebook.  Click here to view their article in Spanish. We will follow up on this shortly.  AG] The malware phenomenon started by the announcement of Osama Bin Laden’s death continues

Cyberthieves just love a good wedding, or a funeral…

Not using Twitter or Facebook is, in these times, akin to not owning or using a mobile ‘phone. Last night’s events – the reported death of Osama Bin Laden – proved that we are well and truly in the Twitter era (Twitter reported that over 4000 tweets per second were made immediately preceding the President’s

Coreflood dries up

The US Department of Justice's announcement yesterday of the takedown of the command and  control (C&C) servers for the Coreflood bots (detected by ESET as Win32/AFCore) and seizure of their domains marks another step in the growing awareness that crime, whether it is committed with bullets or with botnets, is still crime.  This particular botnet,

Coreflood Reduced to a Backwater

Here’s a little information from ESET’s point of view about the Coreflood botnet, whose C&C (Command and Control) servers were taken down yesterday by the Department of Justice. The Coreflood bot is detected by ESET products as Win32/Afcore and has been active since the early years of the last decade (certainly since 2001), though our

Desafío 14 de ESET

Compartimos nuevamente con ustedes un desafío de ESET Latinoamérica, en donde alentamos a nuestros lectores a jugar con diversas técnicas informáticas para descubrir una solución. En esta oportunidad vamos a trabajar sobre una historia: caso de robo. La historia comienza de esta manera: hace algunos días atrás un amigo se contactó conmigo para que lo

SC Magazine: Cybercrime Corner

You may not be aware that ESET writers have been supplying blogs to SC Magazine for a while now. Recently, Randy Abrams and I were drafted in after the original contributors moved on, and we started contributing this week: Poachers and Gamekeepers considers whether there is a conflict of interest when AV companies work with

More unflattering imitation

[Update: more information from ESET on this malware here.] Last October, my colleague Tasneem Patanwala blogged about rogue antivirus masquerading as an ESET product. In that instance it was a product calling itself Smart Security, and Tasneem's blog includes lots of useful information about that particular malware, and fake AV in general. Looking through my

Me infecté, ¿y ahora qué hago? – Parte II

El día de hoy les traemos la segunda entrega del post de la semana pasada, donde detallábamos cómo deben proceder si fueron víctimas de una infección y no poseían una solución antivirus. Anteriormente les brindamos un procedimiento básico de como identificar, localizar y posteriormente eliminar dicha amenaza, pero no profundizamos demasiado en qué se debe

More on Stuxnet

A few more developments in the Never-Ending Story: Michael Joseph Gross on A Declaration of Cyber War in Vanity Fair. Despite a somewhat breathless tone in the introduction – "the world’s top software-security experts were panicked by the discovery of a drone-like computer virus" (where's my Valium?!) – actually a comprehensive and largely accurate account. It

Me infecté, ¿y ahora qué hago? – Parte I

Incontables veces hemos explicado en este blog cómo evitar ser víctimas del malware, pero… ¿qué hay con aquellos lectores que sí se infectaron y no disponían de una solución antivirus? Bueno, este post es para ustedes, ya que aquí explicaremos qué acciones les recomendamos tomar para recuperar el control de su equipo y evitar una

Mamushka de rogue

Como ya habíamos mencionado en el post anterior Clonando Rogue, la similitud entre las muestras mencionadas es llamativa. En este caso vamos a hacer un análisis un poco más profundo de uno de los ejecutables para demostrar en qué aspectos se diferencian entre sí y principalmente en qué se parecen. Las muestras a comparar son

Desafío 13 de ESET: verdadero o falso

Nuevamente compartimos con ustedes un nuevo desafío por parte de ESET Latinoamérica. En esta oportunidad, vamos a jugar al clásico juego de verdadero o falso sobre programas de seguridad informática: algunos serán verídicos y otros resultarán ser malware del tipo rogue. Como les comentamos regularmente sobre las amenazas del tipo rogue, estas simulan ser soluciones

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
07 Sep 2011
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.