(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Video

Common password mistakes we all make

Common password mistakes we all make

Video

Common password mistakes we all make

Passwords are critical to safeguarding our personal and financial information, but when using them so often it can be easy to make mistakes. Follow these five simple steps from We Live Security to keep your passwords safe.

Editor08 Aug 2014


Video

How to avoid tech support scams

How to avoid tech support scams

Video

How to avoid tech support scams

Tech support scams come in many different forms and can be hard to detect. Following these simple steps fromWe Live Security will help you recognise and avoid them.

Editor25 Jul 2014


Video

How to get rid of posts and photos you hate on Facebook

How to get rid of posts and photos you hate on Facebook

Video

How to get rid of posts and photos you hate on Facebook

Almost everyone now has a Facebook account where posts and photos are frequently shared. However keeping track of what is posted can sometimes be a problem. Follow these 5 simple tips to get rid of content you no longer wish to share.

Editor24 Jul 2014


ESET Research

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

ESET Research

Android/Simplocker using FBI child-abuse warnings to scare victims into paying $300

Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…

Robert Lipovsky22 Jul 2014


Cybercrime, Video

Router attacks: Five simple tips to lock criminals out

Router attacks: Five simple tips to lock criminals out

Cybercrime, Video

Router attacks: Five simple tips to lock criminals out

Cyber criminals are constantly targeting home routers and its becoming increasingly difficult to keep them secure. Follow these 5 simple tips from We Live Security to lock criminals out.

Editor16 Jul 2014


ESET Research

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

ESET Research

Win32/Aibatook: Banking Trojan Spreading Through Japanese Adult Websites

Win32/Aibatook targets Japanese bank customers with an unusual Internet Explorer monitoring technique. We believe the malware has been in development for months - and is now ready for take-off.

ESET Research16 Jul 2014


Privacy, Cybercrime, Video

How to protect your small business from cybercrime

How to protect your small business from cybercrime

Privacy, Cybercrime, Video

How to protect your small business from cybercrime

Internet security may not be at the top of your priority list when starting a new business, but ignoring the dangers may be costly. Follow these 5 simple tips from We Live Security to avoid any potential threats.

Editor15 Jul 2014


Privacy, Video

How to clean up your online profile for a job interview

How to clean up your online profile for a job interview

Privacy, Video

How to clean up your online profile for a job interview

It's easy to forget who may be reading when sharing content on social media, so clean your online profiles before a job interview with these five simple tips.

Editor03 Jul 2014


ESET Research

UPDATED: Simplocker ransomware: New variants spread by Android downloader apps

UPDATED: Simplocker ransomware: New variants spread by Android downloader apps

ESET Research

UPDATED: Simplocker ransomware: New variants spread by Android downloader apps

ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games like Grand Theft Auto: San Andreas.

Robert Lipovsky25 Jun 2014