White Papers

86 reports

Trends for 2013 - Astounding growth of mobile malware

Trends for 2013 - Astounding growth of mobile malware

ESET Latin America's Malware Analysis Lab reviews the year and compiles threat trends for the upcoming season. So how will the 2013 threatscape look like according to the IT security company ESET? It will definitely see major growth of mobile malware and its variants, increased malware propagation via websites, continuing rise of botnets and attacks on the cloud resulting in information leaks.


The Passing Storm

The Passing Storm

The Storm botnet may have blown itself out, but its legacy remains. This paper places Storm in the context of botnets in general, examining its technical, social, and security implications.


ACAD/Medre.A

ACAD/Medre.A

10000‘s of AutoCAD Designs Leaked in Suspected Industrial Espionage.


Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

What is a potentially unwanted application (PUA)? This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.


Stuxnet Under the Microscope

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources. This is probably the last update of the document, but further relevant resources will be added to a list here.


OSX/Flashback

OSX/Flashback

The first malware to infect hundreds of thousands of Apple Mac


Windows 8: FUD* for thought

Windows 8: FUD* for thought

An analysis of the newest and most interesting security features in Windows 8, Microsoft's newest desktop operating system, as well as how it may be attacked in the future.


Conficker by the numbers

Conficker by the numbers

This is a translation for ESET LLC of a document previously available in Spanish.


2010: Cybercrime Coming of Age

2010: Cybercrime Coming of Age

The Research teams in ESET Latin America and ESET North America put their heads together in December 2009 to discuss the likely shape of things to come in the next 12 months in security and cybercrime.