Hodprot: Hot to Bot

A comprehensive analysis of Win32/Hodprot, one of the families of malware most used in banking fraud in Russia and its neighbours.

The Evolution of TDL: Conquering x64 (revision 1.1)

A comprehensive analysis of the TDSS/Olmarik/Alureon family, which has learned some radical new tricks. Updated to include information on a new plugin making radical changes to Olmarik’s botnet.

Hanging on the Telephone

As if fake anti-virus products weren’t bad enough, nowadays we have unsolicited phone-calls from fake AV helpdesks. ESET researchers tell you pdf about support scams.

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources. This is probably the last update of the document, but further relevant resources will be added to a list here.

Trends for 2011 – Botnets and Dynamic Malware

Researchers from ESET’s Laboratories in Latin America summarize the main trends anticipated for 2011 in malicious programs and antivirus security.

Twenty Years Before the Mouse

Written in the form of a personal retrospective, this paper compares the earliest days of PC computer viruses with today’s threats, as well as provides a glimpse into the origins of the computer anti-virus industry.

A Tried and True Weapon: Social Engineering

A discussion of some of the ways in which attackers use psychological manipulation to trick their victims.

Choosing Your Password

Some ways of avoiding easily guessable passwords.

Ten Ways to Dodge CyberBullets

Around New Year it seems that everyone wants a top 10: the top 10 most stupid remarks made By celebrities, the 10 worstdressed French poodles, the 10 most embarrassing political speeches and so on. We revisited some of the ideas that our Research team at ESET North America came up with at the end of 2008 for a “top 10 things that people can do to protect themselves against malicious activity.”

Conficker by the numbers

This is a translation for ESET LLC of a document previously available in Spanish By ESET Latin America Click here.

The Internet Book of the Dead

This paper is a bit different from other papers you’ll find on the ESET white papers page. Following is a mock interview between Dan Damon, of BBC radio and David Harley discussing the complications of a digital world when someone passes away.

2010: Cybercrime Coming of Age

The Research teams in ESET Latin America and ESET North America put their heads together in December 2009 to discuss the likely shape of things to come in the next 12 months in security and cybercrime.

Staying Safe on the Internet

On the Information Superhighway, the traffic signals are always at amber. Here are some suggestions for reducing the risk from collisions and carjacks. Part One of a series of short papers.

Keeping Secrets: Good Password Practice

Everyone knows that passwords are important, but what is a good password and how do you keep it safe?

Social Security Numbers: Identification is Not Authentication

Americans are often expected to share their SSNs inappropriately: what are the security implications, and how serious are they?

Playing Dirty

Describes in detail how criminals make money out of stealing online gaming credentials and assets.

Cybersecurity Review: Background, threatscape, best-practices and resources

Cybersecurity is about protecting information and its related resources. This paper examines the different threats we face from cybercrime (the threatscape), real-world statistics to explain the scope and reach of cybercrime, and consumer and business best-practices — to protect both critical and non-critical information.

Free but Fake: Rogue Anti-malware

Understanding and avoiding fake anti-malware programs that offer “protection” from malware that doesn’t really exist.

Common Hoaxes and Chain Letters

An ongoing series of papers that describe some of the commonly-found lies and half-truths that continue to circulate on the Internet, and discuss some ways of identifying them.

Net of the Living Dead: Bots, Botnets and Zombies

Describes the botnet phenomenon in detail: its origins and history, current trends, and what you need to do about it.

Follow us

Copyright © 2018 ESET, All Rights Reserved.