The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.
ESET detected a modified version of Windows Movie Maker that aims to collect money from unaware users. The spread has been boosted by SEO.
In general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are some additional issues to take into account.
At present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.
While this may sound daunting and the consequences of non-compliance are significant, it’s considered unlikely that regulators will make an example of small businesses that can demonstrate they have a plan and have attempted to comply fully with requirements.
If you see yourself often being curious about the behavior of computer threats, maybe it's time you consider getting involved in cybersecurity.
Can you imagine how Dr. Cohen actually created the virus or how Prof. Adleman came up with its name? The work of these men ended up inspiring a constant development of computer defense techniques, and constant research on computer threats
The story of viruses took place in a university laboratory and, keeping in mind the parallelism, we want to show you what is a malware research laboratory like and what exactly happens there.
In 1983, two computer scientists made history and we want to honor their early work. They laid the foundation for research on computer threats, and for what later came to be our mission on antimalware protection.
Millions of websites running WordPress are being strongly urged to update to the latest version of the popular content management system as soon as possible, after a serious security vulnerability was uncovered.
In our previous blog entries we covered Simple Steps to Online Safety, Cybersecurity in the Workplace and Today’s Predictions for Tomorrow’s Internet. In our final blog in the series we will be talking about the opportunities that await you if you were interested in a career in cybersecurity.
As you company grows globally you will be faced with many challenges and it can be easy to forget, unintentionally, some of the steps you have gone through to get to the position your company finds itself in.
To honor the work of Dr. Fred Cohen and Professor Len Adleman, and the foundation they laid for research of computer threats, we decided to declare November 3 as the first ever Antimalware Day.
This weekend British tabloid newspaper The Sunday Mirror warned of a potential "risk to national security" after a memory stick containing sensitive information about Heathrow airport was reportedly "found in the street."
Relating the collaboration between ESET experts and the FBI about the Windigo's operation, which ended with the sentencing of Maxim Senakh.
In 2014, ESET researchers wrote a blog post about an OpenSSH backdoor and credential stealer called Linux/Ebury In 2017, the team found a new Ebury sample.
A long-term strategy focused on training and educating the next generation will help to ensure enough people have the right skills for the future.
The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it.
In our previous blog entries we covered Simple Steps to Online Safety and Cybersecurity in the Workplace. In the blog today we will be talking about some of today's predictions when it comes to the internet of tomorrow.
Canadian small and medium businesses (SMBs) use a multitude of skills and resources to continuously improve all aspects of their companies’ performance.