ESET Research


2223 articles

More on that Java vulnerability

More on that Java vulnerability

More on that Java vulnerability

David Harley11 Jan 2013


Java 0-Day Exploit CVE-2013-0422

Java 0-Day Exploit CVE-2013-0422

Java 0-Day Exploit CVE-2013-0422

Robert Lipovsky11 Jan 2013


Malware

Imperva, VirusTotal, and whether AV is useful

Imperva, VirusTotal, and whether AV is useful

Malware

Imperva, VirusTotal, and whether AV is useful

Offending the AV industry is one thing, but do you want to base a security strategy (at home or work) on a PR exercise based on a statistical misunderstanding? (Yes, I'm being diplomatic here...)

David Harley03 Jan 2013


Phishing and malware - keep Smiling through...

Phishing and malware - keep Smiling through...

Phishing and malware - keep Smiling through...

Three current phishing gambits and email-borne malware currently getting past normally efficient email filtering.

David Harley02 Jan 2013


Malware

The Industrialization of Malware: One of 2012's darkest themes persists

The Industrialization of Malware: One of 2012's darkest themes persists

Malware

The Industrialization of Malware: One of 2012's darkest themes persists

Stephen Cobb31 Dec 2012


Scams

Phishing and the Smile on the Face of the Tiger

Phishing and the Smile on the Face of the Tiger

Scams

Phishing and the Smile on the Face of the Tiger

Two rough and ready phishing emails that nevertheless tell us a great deal about the social engineering underlying more sophisticated, graphic-rich scams.

David Harley28 Dec 2012


Win32/Gapz: New Bootkit Technique

Win32/Gapz: New Bootkit Technique

Win32/Gapz: New Bootkit Technique

Win32/Gapz's new bootkit technique modifies just 4 bytes of the original VBR, has an enhanced dropper and complex kernel mode functionality, and evades ELAM.

Eugene Rodionov27 Dec 2012


Win32/Gapz: steps of evolution

Win32/Gapz: steps of evolution

Win32/Gapz: steps of evolution

Win32/Gapz has a new technique for code injection and a new VBR infection method. The dropper has many tricks for bypassing detection by security software.

Aleksandr Matrosov27 Dec 2012


Securing Your Holiday Tech Gifts, Part 2: Android Guide

Securing Your Holiday Tech Gifts, Part 2: Android Guide

Securing Your Holiday Tech Gifts, Part 2: Android Guide

Cameron Camp21 Dec 2012