(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Social Media

PokerAgent botnet stealing over 16,000 Facebook credentials

PokerAgent botnet stealing over 16,000 Facebook credentials

Social Media

PokerAgent botnet stealing over 16,000 Facebook credentials

The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims.

Robert Lipovsky29 Jan 2013


Your Apple Mac made even safer: Part 3 of securing new devices

Your Apple Mac made even safer: Part 3 of securing new devices

Your Apple Mac made even safer: Part 3 of securing new devices

If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.

Stephen Cobb28 Jan 2013


Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Sébastien Duquette24 Jan 2013


Malware

Walking through Win32/Jabberbot.A

Walking through Win32/Jabberbot.A

Malware

Walking through Win32/Jabberbot.A

Alexis Dorais-Joncas23 Jan 2013


How To

5 physical security tips for protecting your digital devices

5 physical security tips for protecting your digital devices

How To

5 physical security tips for protecting your digital devices

As we read earlier this week, the chances that one or more of your digital devices may get stolen are uncomfortably high. So what would happen if your mobile device falls into the wrong hands? Here are a few tips that will help minimize the damage if it happens to you.

Cameron Camp17 Jan 2013


Scams

Mystery shopper scam: misery shopping

Mystery shopper scam: misery shopping

Scams

Mystery shopper scam: misery shopping

Money for nothing? Don't believe it: a variation on the Mystery Shopper scam that misuses the Pinecone Research brand.

David Harley16 Jan 2013


Are fears of digital device theft justified? Survey says yes

Are fears of digital device theft justified? Survey says yes

Are fears of digital device theft justified? Survey says yes

Everybody knows that laptop computers, tablets and smartphones get stolen, and everybody reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?

Stephen Cobb14 Jan 2013


More on that Java vulnerability

More on that Java vulnerability

More on that Java vulnerability

David Harley11 Jan 2013


Java 0-Day Exploit CVE-2013-0422

Java 0-Day Exploit CVE-2013-0422

Java 0-Day Exploit CVE-2013-0422

Robert Lipovsky11 Jan 2013