Boxer SMS Trojan

Analysis of an SMS Trojan found on Android smartphones that is capable of executing SMS premium rate scams in a wide range of countries. ESET researchers in Latin America combine code inspection with investigation of consumer forums to reveal the first threat of the kind targeting Latin American countries, but with implications that are global.

Online Shopping and a Phishing Pheeding Phrenzy

Phishing scams old and new, and some ways to recognize the baited hook before you bite off more than you can chew.

Windows 8: FUD* for thought

An analysis of the newest and most interesting security features in Windows 8, Microsoft’s newest desktop operating system, as well as how it may be attacked in the future.


The first malware to infect hundreds of thousands of Apple Mac


10000‘s of AutoCAD Designs Leaked in Suspected Industrial Espionage.

Trends for 2012: Malware Goes Mobile

ESET Latin America’s Malware Analysis Lab looks at the implications of changes in the threat landscape, focusing in particular on anticipated developments in mobile threats.

Ten Ways to Dodge CyberBullets: Reloaded

An updated version of the paper “Ten Ways to Dodge CyberBullets”, addressing the question “what are the top 10 things that people can do to protect themselves against malicious activity?”

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

What is a potentially unwanted application (PUA)? This paper gives some examples of “potentially unwanted” and “potentially unsafe” applications, explaining how they differ from out-and-out malware.

Win32/Carberp: When You’re in a Black Hole, Stop Digging

This paper consolidates information published By ESET and Group-IB researchers on Russian malware that attacks Russian RBS (Remote Banking Systems) transactions: now updated to version 1.1 to include additional material.

Options for backing up your computer

If you know you need to back up your data but you’re not sure how to do it, here’s a practical guide on how to get started.

Hodprot: Hot to Bot

A comprehensive analysis of Win32/Hodprot, one of the families of malware most used in banking fraud in Russia and its neighbours.

The Evolution of TDL: Conquering x64 (revision 1.1)

A comprehensive analysis of the TDSS/Olmarik/Alureon family, which has learned some radical new tricks. Updated to include information on a new plugin making radical changes to Olmarik’s botnet.

Hanging on the Telephone

As if fake anti-virus products weren’t bad enough, nowadays we have unsolicited phone-calls from fake AV helpdesks. ESET researchers tell you pdf about support scams.

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources. This is probably the last update of the document, but further relevant resources will be added to a list here.

Trends for 2011 – Botnets and Dynamic Malware

Researchers from ESET’s Laboratories in Latin America summarize the main trends anticipated for 2011 in malicious programs and antivirus security.

Twenty Years Before the Mouse

Written in the form of a personal retrospective, this paper compares the earliest days of PC computer viruses with today’s threats, as well as provides a glimpse into the origins of the computer anti-virus industry.

A Tried and True Weapon: Social Engineering

A discussion of some of the ways in which attackers use psychological manipulation to trick their victims.

Choosing Your Password

Some ways of avoiding easily guessable passwords.

Ten Ways to Dodge CyberBullets

Around New Year it seems that everyone wants a top 10: the top 10 most stupid remarks made By celebrities, the 10 worstdressed French poodles, the 10 most embarrassing political speeches and so on. We revisited some of the ideas that our Research team at ESET North America came up with at the end of 2008 for a “top 10 things that people can do to protect themselves against malicious activity.”

Conficker by the numbers

This is a translation for ESET LLC of a document previously available in Spanish By ESET Latin America Click here.

Follow us

Copyright © 2017 ESET, All Rights Reserved.