Award-winning news, views, and insight from the ESET security community
Malware
The odd, 8-year legacy of the Conficker worm
The Conficker worm was huge news when it emerged towards the end of 2008, exploiting millions of Windows devices. Today, it remains one of the most pervasive malware families around the globe.
Editor • 21 Nov 2016
Sednit: A very digested read
This feature offers a very digested read of ESET's trilogy of research papers on Sednit, one of the most notorious groups of cyberattackers in the world.
Editor • 11 Nov 2016
Internet of Things
Secure your router: How to help prevent the next internet takedown
Secure your router, says ESET's Lysa Myers. It can help protect all of your connected devices while they are in your home.
Lysa Myers • 08 Nov 2016
How to do an APK Analysis Using AppMon
There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.
Denise Giusto Bilić • 07 Nov 2016
Flashback Tuesday: The Morris Worm
On November 2nd 1988, the Morris Worm was released, bringing the internet to an effective standstill. It was a seminal moment in internet history.
Editor • 02 Nov 2016
Malware, Mobile Security
A history of mobile malware from Cabir to SMS Thief
As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here's a short history of its development.
Editor • 01 Nov 2016
Trick or threat? How zombie IoT devices surprised the internet
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.
Ondrej Kubovič • 31 Oct 2016
The Hive Mind: When IoT devices go rogue
IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.
Michael Aguilar • 26 Oct 2016
10 things to know about the October 21 IoT DDoS attacks
On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.
Stephen Cobb • 24 Oct 2016