White Papers

91 reports

Stuxnet Under the Microscope

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources. This is probably the last update of the document, but further relevant resources will be added to a list here.


Windows 8: FUD* for thought

Windows 8: FUD* for thought

An analysis of the newest and most interesting security features in Windows 8, Microsoft's newest desktop operating system, as well as how it may be attacked in the future.


Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

What is a potentially unwanted application (PUA)? This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.


Conficker by the numbers

Conficker by the numbers

This is a translation for ESET LLC of a document previously available in Spanish.


Options for backing up your computer

Options for backing up your computer

If you know you need to back up your data but you're not sure how to do it, here's a practical guide on how to get started.


OSX/Flashback

OSX/Flashback

The first malware to infect hundreds of thousands of Apple Mac


Heuristic Analysis - Detecting Unknown Viruses

Heuristic Analysis - Detecting Unknown Viruses

A detailed analysis of the differences between traditional threat-specific detection and proactive detection by generic detection and behavior analysis.


Hodprot: Hot to Bot

Hodprot: Hot to Bot

A comprehensive analysis of Win32/Hodprot, one of the families of malware most used in banking fraud in Russia and its neighbours.


Net of the Living Dead: Bots, Botnets and Zombies

Net of the Living Dead: Bots, Botnets and Zombies

Describes the botnet phenomenon in detail: its origins and history, current trends, and what you need to do about it.