British police arrested a man and a woman earlier this week, suspected of operating a website which offered services to online criminals which could help them evade detection by anti-virus software.
When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.
British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK's willingness to engage in cyberwarfare to defend itself.
The question of antivirus software being dead is one that doesn't seem to go away. Why is that? Distinguished ESET researcher Aryeh Goretsky explores.
Ghosts, monsters and the living dead can all send a chill down one's spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece of Android malware known as DroidJack.
Banking trojans are ubiquitous and growing in number and sophistication, largely through trojan downloaders and webinjects. Here are four severe cases.
A new malware identified as YiSpecter attacks iOS devices with and without jailbreak, researchers from Palo Alto Networks have revealed. ESET has detected this malware as a trojan with both variants iOS/YiSpecter.A and iOS/YiSpecter.B.
Apple has removed more than 300 malicious apps after confirming the first major breach to its iOS app store.
A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today's service for sale.
The latest ESET discovery of the first known Android lock-screen-type ransomware that spreads in the wild and sets the phone's PIN lock is examined.
Virtualization aims to totally change how we think of IT altogether. Against the backdrop of VMworld, we take a closer look at the key details.
If you have a ton of VMs sprawling the globe, how do you make them all fast? That’s the subject floating around the show floor at VMworld in SFO this year.
This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.
A recently identified trojan porn clicker is still infecting apps on Google Play.
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
The infamous Sednit espionage group is currently using the Hacking Team exploits disclosed earlier this week to target eastern European institutions.