ESET Research


2223 articles

How To

How to fix Shellshock Bash on Mac OS X: Mavericks edition

How to fix Shellshock Bash on Mac OS X: Mavericks edition

How To

How to fix Shellshock Bash on Mac OS X: Mavericks edition

Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for various versions of OS X. But if you use Mavericks you will need to install 10.9.5 before the Bash fix will work.

Stephen Cobb30 Sep 2014


How to resolve Shellshock on Mac OS X, web servers and more

How to resolve Shellshock on Mac OS X, web servers and more

How to resolve Shellshock on Mac OS X, web servers and more

The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patched to prevent abuse by malicious persons. Here's advice about what to do and links to more in-depth resources.

Stephen Cobb25 Sep 2014


Malware

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

Malware

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

Robert Lipovsky22 Sep 2014


Virus Bulletin presentations update

Virus Bulletin presentations update

Virus Bulletin presentations update

Updated information on ESET presentations at Virus Bulletin 2014.

David Harley22 Sep 2014


Video

How to make your social media accounts (almost) unhackable

How to make your social media accounts (almost) unhackable

Video

How to make your social media accounts (almost) unhackable

Now more than ever, its important to make sure your social media accounts are safe and secure. Here are our 6 top tips to make your social media accounts almost unhackable.

Editor18 Sep 2014


Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Autumn: the season of mists and mellow fruitfulness, not to mention a couple of excellent security conferences. Virus Bulletin and AVAR make a very tasty Conference Pair.

David Harley10 Sep 2014


Video

VPN for beginners

VPN for beginners

Video

VPN for beginners

Virtual private networks use a public network, usually the internet, to connect remote users together. This video aims to give you a better understanding of the concept, helping you choose the right VPN for your needs.

Editor05 Sep 2014


Video

Scareware: How to tell if a threat isn't real

Scareware: How to tell if a threat isn't real

Video

Scareware: How to tell if a threat isn't real

Scareware is a strategy that Cybercriminals use to trick users into buying and downloading unnecessary and potentially dangerous software. Listen to our top tips to identify whether a threat is real or not.

Editor05 Sep 2014


Scams

TorrentLocker now targets UK with Royal Mail phishing

TorrentLocker now targets UK with Royal Mail phishing

Scams

TorrentLocker now targets UK with Royal Mail phishing

Marc-Etienne M.Léveillé04 Sep 2014