ESET Research


2223 articles

Combofix: a cocktail of infective factors

Combofix: a cocktail of infective factors

Combofix: a cocktail of infective factors

In various blog-posts, users have been encouraged by ESET experts to download applications from the official website for that application, as you never know what might have happened to the software when you download it from a mirror site or a download site.

Righard Zwienenberg01 Feb 2013


Straight facts about Mac malware, threats and responses

Straight facts about Mac malware, threats and responses

Straight facts about Mac malware, threats and responses

Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the "correct' answer has changed over time.

Stephen Cobb31 Jan 2013


Social Media

PokerAgent botnet stealing over 16,000 Facebook credentials

PokerAgent botnet stealing over 16,000 Facebook credentials

Social Media

PokerAgent botnet stealing over 16,000 Facebook credentials

The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims.

Robert Lipovsky29 Jan 2013


Your Apple Mac made even safer: Part 3 of securing new devices

Your Apple Mac made even safer: Part 3 of securing new devices

Your Apple Mac made even safer: Part 3 of securing new devices

If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.

Stephen Cobb28 Jan 2013


Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

Sébastien Duquette24 Jan 2013


Malware

Walking through Win32/Jabberbot.A

Walking through Win32/Jabberbot.A

Malware

Walking through Win32/Jabberbot.A

Alexis Dorais-Joncas23 Jan 2013


How To

5 physical security tips for protecting your digital devices

5 physical security tips for protecting your digital devices

How To

5 physical security tips for protecting your digital devices

As we read earlier this week, the chances that one or more of your digital devices may get stolen are uncomfortably high. So what would happen if your mobile device falls into the wrong hands? Here are a few tips that will help minimize the damage if it happens to you.

Cameron Camp17 Jan 2013


Scams

Mystery shopper scam: misery shopping

Mystery shopper scam: misery shopping

Scams

Mystery shopper scam: misery shopping

Money for nothing? Don't believe it: a variation on the Mystery Shopper scam that misuses the Pinecone Research brand.

David Harley16 Jan 2013


Are fears of digital device theft justified? Survey says yes

Are fears of digital device theft justified? Survey says yes

Are fears of digital device theft justified? Survey says yes

Everybody knows that laptop computers, tablets and smartphones get stolen, and everybody reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?

Stephen Cobb14 Jan 2013