(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Social Media

Pinterest.com security - step by step how-to

Pinterest.com security - step by step how-to

Social Media

Pinterest.com security - step by step how-to

Cameron Camp22 Feb 2012


Digital Security

Security awareness, security breaches, and the abuse of "stupid"

Security awareness, security breaches, and the abuse of "stupid"

Digital Security

Security awareness, security breaches, and the abuse of "stupid"

Stephen Cobb20 Feb 2012


Iranian TOR arms race a shadow of things to come?

Iranian TOR  arms race  a shadow of things to come?

Iranian TOR arms race a shadow of things to come?

Cameron Camp16 Feb 2012


Scams

Cybercrime, Cyberpolicing, and the Public

Cybercrime, Cyberpolicing, and the Public

Scams

Cybercrime, Cyberpolicing, and the Public

Security can't be purely the responsibility of the government, the police, the security industry, the ISPs, the public sector, private industry, or any permutation thereof.

David Harley14 Feb 2012


Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Stephen Cobb13 Feb 2012


Cybercrime

Cybercrime and Punishment

Cybercrime and Punishment

Cybercrime

Cybercrime and Punishment

Like everyone else, law enforcement is expected to perform miracles of efficiency. But it's not all about financial analysis: there is no such thing as victimless crime.

David Harley13 Feb 2012


ACTA and TPP: The wrong approach to intellectual property protection

ACTA and TPP: The wrong approach to intellectual property protection

ACTA and TPP: The wrong approach to intellectual property protection

Why is it that ESET, a company built on the licensing of intellectual property, a company that fights running battles with counterfeiters, is opposed to ACTA and the closely related TPP or Trans-Pacific Partnership?

Andrew Lee10 Feb 2012


Digital Security

Facebook/app data privacy - sharing gone wild

Facebook/app data privacy - sharing gone wild

Digital Security

Facebook/app data privacy - sharing gone wild

Cameron Camp09 Feb 2012


Endpoint Security Webinar: Protecting your network at the sharp end

Endpoint Security Webinar: Protecting your network at the sharp end

Endpoint Security Webinar: Protecting your network at the sharp end

Stephen Cobb08 Feb 2012