White Papers
Conficker by the numbers
Conficker by the numbers
This is a translation for ESET LLC of a document previously available in Spanish.
2010: Cybercrime Coming of Age
2010: Cybercrime Coming of Age
The Research teams in ESET Latin America and ESET North America put their heads together in December 2009 to discuss the likely shape of things to come in the next 12 months in security and cybercrime.
OSX/Flashback
OSX/Flashback
The first malware to infect hundreds of thousands of Apple Mac
Options for backing up your computer
Options for backing up your computer
If you know you need to back up your data but you're not sure how to do it, here's a practical guide on how to get started.
Heuristic Analysis - Detecting Unknown Viruses
Heuristic Analysis - Detecting Unknown Viruses
A detailed analysis of the differences between traditional threat-specific detection and proactive detection by generic detection and behavior analysis.
Hodprot: Hot to Bot
Hodprot: Hot to Bot
A comprehensive analysis of Win32/Hodprot, one of the families of malware most used in banking fraud in Russia and its neighbours.
Net of the Living Dead: Bots, Botnets and Zombies
Net of the Living Dead: Bots, Botnets and Zombies
Describes the botnet phenomenon in detail: its origins and history, current trends, and what you need to do about it.
Phish Phodder: Is User Education Helping or Hindering
Phish Phodder: Is User Education Helping or Hindering
Evaluates research on susceptibility to phishing attacks, and looks at web-based educational resources such as phishing quizzes. Do phished institutions and security vendors promote a culture of dependence that discourages computer users from helping themselves? First published in 2007 Virus Bulletin Conference Proceedings.*
Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?
Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?
What is a potentially unwanted application (PUA)? This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.