A vulnerability has been detected in the BIOS chips found in millions of computers which could leave users open to hacking.
Search results for: "BIOS"
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
A new attack method enables bad actors to access data on a locked computer via an evil maid attack within 5 minutes
At ESET, our engineers are old acquaintances of machine learning. We recognized its potential early on and employed it to help detect malware over 20 years ago. To this day, this symbiosis continues, with neural networks, deep learning, and classification algorithms being integral parts of the protective layers in ESET products and services. This white
ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples
Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor
Criminal activities against accountants on the rise – Buhtrap and RTM still active
ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe
If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later
The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.
The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.
When thinking about security we generally take risk into account. It is well known that risk is a composition of likelihood and potential impact.
Malware coded synthetic genomes have caused skepticism within the scientific community, but new research might help to change that perception.
ESET's Lysa Myers offers a detailed and comprehensive overview on how to stay safe against ransomware attacks, a threat that is growing in prominence.
Ransomware that targets schools is a threat that needs to be understood, explains ESET's Lysa Myers. Top cybersecurity efforts are needed to keep it at bay.
Trojan clicker servers Google Play information Package names of trojan clickers found on the infected servers
In this feature, we highlight some of the key tactics used by cybercriminals via online dating websites, helping you stay safe on Valentine's Day.
Lenovo has announced that LSE,a virtually unremovable software, is no longer being installed on its products.
Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.
The annual Cyber Boot Camp in San Diego aims to develop the skills, mindset, and moral code required defend networks against criminal abuse. Here are just seven of the many lessons students learned at this year's event.