ESET Research


2223 articles

Video

How to keep your email account spam free

How to keep your email account spam free

Video

How to keep your email account spam free

Spam emails are still a big problem, but they needn't be. Check out our tips and tricks to keep your inbox free of annoying spam.

Editor13 Mar 2014


Video

Ebay security: top 5 tips

Ebay security: top 5 tips

Video

Ebay security: top 5 tips

Auction site eBay is one of the best places to find deals online, but it’s also full of scams. Stay safe by following We Live Security’s top 5 tips for eBay security.

Editor13 Mar 2014


ESET Research

Corkow: Analysis of a business-oriented banking Trojan

Corkow: Analysis of a business-oriented banking Trojan

ESET Research

Corkow: Analysis of a business-oriented banking Trojan

Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.

Robert Lipovsky and Anton Cherepanov27 Feb 2014


ESET Research

An In-depth Analysis of Linux/Ebury

An In-depth Analysis of Linux/Ebury

ESET Research

An In-depth Analysis of Linux/Ebury

In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.

Marc-Etienne M.Léveillé21 Feb 2014


ESET Research

Corkow: analysis of a business-oriented banking Trojan

Corkow: analysis of a business-oriented banking Trojan

ESET Research

Corkow: analysis of a business-oriented banking Trojan

In his blog post last week, Graham Cluley introduced the Win32/Corkow banking trojan. The malware has demonstrated continuous activity in the past year, infecting thousands of users - various indicators point to the fact the malware authors are continually developing the trojan.

Robert Lipovsky and Anton Cherepanov21 Feb 2014


ESET Research

Windows exploitation in 2013

Windows exploitation in 2013

ESET Research

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

ESET Research11 Feb 2014


Rob Slade: The truth about quantum cryptography - and what it means for privacy

Rob Slade: The truth about quantum cryptography - and what it means for privacy

Rob Slade: The truth about quantum cryptography - and what it means for privacy

'The first thing you need to know about quantum cryptography is that it isn't cryptography. At least, not the quantum part,' writes Rob Slade, information security researcher, author and malware expert.

Guest Author24 Jan 2014


Malware

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

Malware

Boaxxe adware: 'A good advert sells the product without drawing attention to itself' Part 2

In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.

Joan Calvet17 Jan 2014


Video

Getting started with Bitcoin

Getting started with Bitcoin

Video

Getting started with Bitcoin

Everyone is talking about Bitcoin but is it a safe investment for your savings? We Live Security has five tips for protecting yourself against cybercriminals.

Editor15 Jan 2014