(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Video

Scareware: How to tell if a threat isn't real

Scareware: How to tell if a threat isn't real

Video

Scareware: How to tell if a threat isn't real

Scareware is a strategy that Cybercriminals use to trick users into buying and downloading unnecessary and potentially dangerous software. Listen to our top tips to identify whether a threat is real or not.

Editor05 Sep 2014


Scams

TorrentLocker now targets UK with Royal Mail phishing

TorrentLocker now targets UK with Royal Mail phishing

Scams

TorrentLocker now targets UK with Royal Mail phishing

Marc-Etienne M.Léveillé04 Sep 2014


Video

5 ways to avoid credit card fraud

5 ways to avoid credit card fraud

Video

5 ways to avoid credit card fraud

Your credit card information is highly sensitive and always at risk of theft. Check out our 5 ways of avoiding credit card fraud.

Editor15 Aug 2014


Video

5 tips for sharing an iPad or Android tablet in your home

5 tips for sharing an iPad or Android tablet in your home

Video

5 tips for sharing an iPad or Android tablet in your home

You don’t need to buy a tablet for every member of the family. Our insider tips will help you share a tablet rather than having to buy more than one device.

Editor15 Aug 2014


Video

Common password mistakes we all make

Common password mistakes we all make

Video

Common password mistakes we all make

Passwords are critical to safeguarding our personal and financial information, but when using them so often it can be easy to make mistakes. Follow these five simple steps from We Live Security to keep your passwords safe.

Editor08 Aug 2014


Video

How to avoid tech support scams

How to avoid tech support scams

Video

How to avoid tech support scams

Tech support scams come in many different forms and can be hard to detect. Following these simple steps fromWe Live Security will help you recognise and avoid them.

Editor25 Jul 2014


Video

How to get rid of posts and photos you hate on Facebook

How to get rid of posts and photos you hate on Facebook

Video

How to get rid of posts and photos you hate on Facebook

Almost everyone now has a Facebook account where posts and photos are frequently shared. However keeping track of what is posted can sometimes be a problem. Follow these 5 simple tips to get rid of content you no longer wish to share.

Editor24 Jul 2014


ESET Research

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

ESET Research

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…

Robert Lipovsky22 Jul 2014


Cybercrime, Video

Router attacks: Five simple tips to lock criminals out

Router attacks: Five simple tips to lock criminals out

Cybercrime, Video

Router attacks: Five simple tips to lock criminals out

Cyber criminals are constantly targeting home routers and its becoming increasingly difficult to keep them secure. Follow these 5 simple tips from We Live Security to lock criminals out.

Editor16 Jul 2014