(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

W8ing for V6: What ESET has in store for Windows 8 Users

W8ing for V6: What ESET has in store for Windows 8 Users

W8ing for V6: What ESET has in store for Windows 8 Users

Aryeh Goretsky23 Oct 2012


Olmasco bootkit: next circle of TDL4 evolution (or not?)

Olmasco bootkit: next circle of TDL4 evolution (or not?)

Olmasco bootkit: next circle of TDL4 evolution (or not?)

Analysis of the Olmasco bootkit: a TDL4 variation with an interesting approach to dropper technology

Aleksandr Matrosov18 Oct 2012


Privacy

Younger people less secure online than their elders new study suggests

Younger people less secure online than their elders new study suggests

Privacy

Younger people less secure online than their elders new study suggests

Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That's one of the questions raised by the findings of our recent poll of 2,129 U.S. adults (aged 18 and over) by Harris Interactive.

Stephen Cobb18 Oct 2012


Malware

Malware and Medical Devices: hospitals really are unhealthy places...

Malware and Medical Devices: hospitals really are unhealthy places...

Malware

Malware and Medical Devices: hospitals really are unhealthy places...

Mass murder by pacemaker hacking isn't the likeliest scenario, but clinical tools and SCADA devices still deserve serious security scrutiny.

David Harley18 Oct 2012


Telescammer Hell: What's Still Driving The PC Support Scammers?

Telescammer Hell: What's Still Driving The PC Support Scammers?

Telescammer Hell: What's Still Driving The PC Support Scammers?

FTC action isn't diminishing the volume of reported support scam calls and losses: what's driving the people behind the scam, and what does the future hold?

David Harley15 Oct 2012


Virus Bulletin 2012 Slides

Virus Bulletin 2012 Slides

Virus Bulletin 2012 Slides

The slides for many of the presentations by ESET researchers at VB 2012 can now be found on the Virus Bulletin conference web pages.

David Harley14 Oct 2012


Digital Security

How's your cyber security awareness? Or, do we really need security training?

How's your cyber security awareness? Or, do we really need security training?

Digital Security

How's your cyber security awareness? Or, do we really need security training?

As you may know, October is National Cyber Security Awareness Month in America, which is a good time to ask yourself how aware you are when it comes to threats to your digital devices and personal information.

Stephen Cobb12 Oct 2012


Scams

Avoid Election Season Scams: Donations and cruises to avoid

Avoid Election Season Scams: Donations and cruises to avoid

Scams

Avoid Election Season Scams: Donations and cruises to avoid

Cameron Camp12 Oct 2012


Defeating anti-forensics in contemporary complex threats

Defeating anti-forensics in contemporary complex threats

Defeating anti-forensics in contemporary complex threats

Alexandr Matrosov summarizes the evolution of complex threats using hidden storage, as discussed in his presentation with Eugene Rodionov at Virus Bulletin 2012.

Aleksandr Matrosov11 Oct 2012