Business security


277 articles

Ransomware

Cryptolocker 2.0 – new version, or copycat?

Cryptolocker 2.0 – new version, or copycat?

Ransomware

Cryptolocker 2.0 – new version, or copycat?

Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.

Robert Lipovsky19 Dec 2013


Business Security

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

Business Security

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.

Rob Waugh17 Dec 2013


Ransomware, Cybercrime

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can do to protect against ransomware, including Cryptolocker

Ransomware, Cybercrime

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.

Lysa Myers12 Dec 2013


How To, Business Security

Why your small business needs an information security policy and a WISP

Why your small business needs an information security policy and a WISP

How To, Business Security

Why your small business needs an information security policy and a WISP

Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.

Stephen Cobb04 Dec 2013


Malware, Business Security

When malware goes bad: an historical sampler

When malware goes bad: an historical sampler

Malware, Business Security

When malware goes bad: an historical sampler

A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?

Stephen Cobb30 Nov 2013


Malware, Business Security

ESET response to Bits of Freedom open letter on detection of government malware

ESET response to Bits of Freedom open letter on detection of government malware

Malware, Business Security

ESET response to Bits of Freedom open letter on detection of government malware

A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET's official response.

Andrew Lee11 Nov 2013


Ransomware

Filecoder: Holding your data to ransom

Filecoder: Holding your data to ransom

Ransomware

Filecoder: Holding your data to ransom

Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new. We’ve noted a significant increase in Filecoder activity over the past few summer months - in this blog post we address the questions we’re getting about this issue.

Robert Lipovsky23 Sep 2013