ESET's David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?
ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries.
In contrast to the Eurovision contestants, malware writers try to make their creations as stealthy as possible. But thanks to unique behavior and sometimes even unintended showmanship of their malicious code, they end up in the limelight.
The FBI has published a list of tips to reduce the chance of ransomware being the ruin of your company - and is keen that you don't pay the extortionists.
A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future...
In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.
ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.
ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection and reverse-engineering.
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware, reports ESET's Tomáš Gardoň.
This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.
New ransomware infecting Apple OS X surfaced on March 4th, 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend.
Just as audiences have suffered from bad movie craftsmanship, IT users have had to endure the consequences of the malicious work done by malware authors. Welcome to Razzies for malware.
ESET researchers have found 343 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.
ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.
Trojan clicker servers Google Play information Package names of trojan clickers found on the infected servers
The most pressing IT security issue that companies in the EMEA region face is malware infection, reports Ondrej Kubovič. Enterprises are very worried.
After an investigation period, details were published about a unique cyberattack on a Russian bank where a malware placed trade orders for $500 million and heavily manipulated the ruble-dollar exchange rate.
ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.
Almost a year ago we warned about the spreading of Remtasu, and far from lessening, we have been able to identify numerous instances of this threat being propagated further.
Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices. But what about your smartphone? Is there a patch for you, and can you get your hands on it?