White Papers
Windows 10 security and privacy: An in-depth review and analysis
Windows 10 security and privacy: An in-depth review and analysis
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.
Visiting the bear Den Presentation for REcon 2016
Visiting the bear Den Presentation for REcon 2016
A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy.
Operation Groundbait: Analysis of a surveillance toolkit
Operation Groundbait: Analysis of a surveillance toolkit
Operation Buhtrap Presentation for AVAR2015
Operation Buhtrap Presentation for AVAR2015
A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap.
The Rise of Android Ransomware
The Rise of Android Ransomware
Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.
Windows Exploitation in 2015
Windows Exploitation in 2015
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.
Windows 10: Should you go there?
Windows 10: Should you go there?
Is Anti-Virus dead?
Is Anti-Virus dead?
Is Anti-Virus dead?
Unpack Your Troubles: .NET packer tricks countermeasures
Unpack Your Troubles: .NET packer tricks countermeasures
Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.
