ESET Threat Trends Predictions for 2014: The Challenge of Internet Privacy

ESET, the global leader in proactive digital protection with a record 10 years of consecutive VB100 awards for its ESET NOD32 technology, has released today its annual predictions for the threatscape in the upcoming year “Trends 2014 – The Challenge of Internet Privacy”.

Chronology of a Skype Attack: The Rodpicom Worm Propagation

Pablo Ramos, Security Researcher for Latin America together with his colleagues, has looked into the chronology of a Skype attack. They have captured their investigation in a dedicated White Paper named Chronology of a Skype Attack: The Rodpicom Worm Propagation.

Windows 8.1 – security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1” point release of Windows 8. The white paper also discusses new risks introduced by Windows 8.1, and looks at whether or not IT shops and users should upgrade.

Hesperbot – A New, Advanced Banking Trojan in the Wild

A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.

What do a banking Trojan, Chrome and a government mail server have in common?

Analysis of a banking Trojan using a browser extension as its execution method and spreading via spam, then using a Brazilian government server to collect the victim’s stolen information.

Six Months with Windows 8

A look at Windows 8 during the first six months of its release. Just how well is it holding up, security-wise? The challenges faced by developers in securing Modern Windows and how piracy in the Windows Store might affect BYOD rollouts in the enterprise.

Mind the Gapz: The most complex bootkit ever analyzed?

A report devoted to analysis of one of the stealthiest bootkits ever seen in the wild – Win32/Gapz.

Origin of the Specious: the Evolution of Misinformation

Welcome to the Web 2.0 incarnation of the Misinformation Superhighway. Did you really think that hoaxing had died out?


The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims. The threat was mostly active in Israel.

Trends for 2013 – Astounding growth of mobile malware

ESET Latin America’s Malware Analysis Lab reviews the year and compiles threat trends for the upcoming season. So how will the 2013 threatscape look like according to the IT security company ESET? It will definitely see major growth of mobile malware and its variants, increased malware propagation via websites, continuing rise of botnets and attacks on the cloud resulting in information leaks.

Boxer SMS Trojan

Analysis of an SMS Trojan found on Android smartphones that is capable of executing SMS premium rate scams in a wide range of countries. ESET researchers in Latin America combine code inspection with investigation of consumer forums to reveal the first threat of the kind targeting Latin American countries, but with implications that are global.

Online Shopping and a Phishing Pheeding Phrenzy

Phishing scams old and new, and some ways to recognize the baited hook before you bite off more than you can chew.

Windows 8: FUD* for thought

An analysis of the newest and most interesting security features in Windows 8, Microsoft’s newest desktop operating system, as well as how it may be attacked in the future.


The first malware to infect hundreds of thousands of Apple Mac


10000‘s of AutoCAD Designs Leaked in Suspected Industrial Espionage.

Trends for 2012: Malware Goes Mobile

ESET Latin America’s Malware Analysis Lab looks at the implications of changes in the threat landscape, focusing in particular on anticipated developments in mobile threats.

Ten Ways to Dodge CyberBullets: Reloaded

An updated version of the paper “Ten Ways to Dodge CyberBullets”, addressing the question “what are the top 10 things that people can do to protect themselves against malicious activity?”

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

What is a potentially unwanted application (PUA)? This paper gives some examples of “potentially unwanted” and “potentially unsafe” applications, explaining how they differ from out-and-out malware.

Win32/Carberp: When You’re in a Black Hole, Stop Digging

This paper consolidates information published By ESET and Group-IB researchers on Russian malware that attacks Russian RBS (Remote Banking Systems) transactions: now updated to version 1.1 to include additional material.

Options for backing up your computer

If you know you need to back up your data but you’re not sure how to do it, here’s a practical guide on how to get started.

Follow us

Copyright © 2018 ESET, All Rights Reserved.