(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Why Anti-Virus is not a waste of money

Why Anti-Virus is not a waste of money

Why Anti-Virus is not a waste of money

Righard Zwienenberg04 Dec 2012


Password handling: challenges, costs, and current behavior (now with infographic)

Password handling: challenges, costs, and current behavior (now with infographic)

Password handling: challenges, costs, and current behavior (now with infographic)

Stephen Cobb04 Dec 2012


Spying on Tibetan sympathisers and activists: Double Dockster*

Spying on Tibetan sympathisers and activists: Double Dockster*

Spying on Tibetan sympathisers and activists: Double Dockster*

David Harley04 Dec 2012


Online Shopping and a Phishing Pheeding Phrenzy [3]

Online Shopping and a Phishing Pheeding Phrenzy [3]

Online Shopping and a Phishing Pheeding Phrenzy [3]

A shortened and updated version of the advice that David Harley and Andrew Lee gave to potential phish victims in an earlier paper. Part 3 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.

David Harley31 Oct 2012


Scams

Online Shopping and a Phishing Pheeding Phrenzy [2]

Online Shopping and a Phishing Pheeding Phrenzy [2]

Scams

Online Shopping and a Phishing Pheeding Phrenzy [2]

Phishing scams and online shopping. Part 2 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.

David Harley31 Oct 2012


Online Shopping and a Phishing Pheeding Phrenzy

Online Shopping and a Phishing Pheeding Phrenzy

Online Shopping and a Phishing Pheeding Phrenzy

Basics of phishing. Part 1 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.

David Harley31 Oct 2012


PC Support Scams: a Forensic View

PC Support Scams: a Forensic View

PC Support Scams: a Forensic View

A paper for the Cybercrime Forensics Education and Training Conference looking at forensic issues that arose during our research into Tech Support Scams.

David Harley30 Oct 2012


Brutalized! South Carolina breach exposes data security woes at State level

Brutalized! South Carolina breach exposes data security woes at State level

Brutalized! South Carolina breach exposes data security woes at State level

Stephen Cobb29 Oct 2012


Telephone Scams: it's not all about PC support

Telephone Scams: it's not all about PC support

Telephone Scams: it's not all about PC support

Recently, I've been hearing about and receiving phone calls from people with Indian accents about something a little different from the classic your PC is virus-infected but you can pay me to get it fixed' support scam.

David Harley24 Oct 2012