(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2232 articles

More on OSX/OpinionSpy

More on OSX/OpinionSpy

More on OSX/OpinionSpy

Further information on OSX/OpinionSpy

David Harley14 Jun 2010


Mac to the Future

Mac to the Future

Mac to the Future

David Harley13 Jun 2010


Cybercrime

IEEE eCrime Researchers Summit 2010 Call for Papers

IEEE eCrime Researchers Summit 2010 Call for Papers

Cybercrime

IEEE eCrime Researchers Summit 2010 Call for Papers

The fifth IEEE eCrime Researchers Summit 2010 once again will be held in conjunction with the 2010 APWG General Meeting between October 18-20, 2010 at Southern Methodist University in Dallas, TX. See http://ecrimeresearch.org.

David Harley12 Jun 2010


$161.84 to Infect 20,000 Users

$161.84 to Infect 20,000 Users

$161.84 to Infect 20,000 Users

ESET Research11 Jun 2010


Malware

Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

Malware

Cross-platform Security Advisory for Flash Player, Adobe Reader and Acrobat

ESET Research09 Jun 2010


Ecuador Government Web Site Attack

Ecuador Government Web Site Attack

Ecuador Government Web Site Attack

A situation has arisen in a governmental site in Ecuador. Taking advantage of a vulnerability on the server where the Web site is hosted, the attackers succeeded in accessing the system remotely.

David Harley08 Jun 2010


iPhone Through the Looking Glass

iPhone Through the Looking Glass

iPhone Through the Looking Glass

...iPhones are, under limited circumstances, willing to share information with other devices when they shouldn't...

David Harley07 Jun 2010


Paying for free software

Paying for free software

Paying for free software

Adobe 0-days are not the only way in which you can be bitten by a PDF.

David Harley06 Jun 2010


Windows Mobile dialup fraud

Windows Mobile dialup fraud

Windows Mobile dialup fraud

It has been reported that a number of apps for smartphones running Windows Mobile that look like legitimate games also have autodialling functionality.

David Harley06 Jun 2010