White Papers
Win32/Industroyer: A new threat for industrial control systems
Win32/Industroyer: A new threat for industrial control systems
Trends in Android ransomware
Trends in Android ransomware
Among other things, this paper delivers a definition of ransomware is provided; ESET’s detection telemetry is used to see the current trends for this cyberthreat; and detail on the most noteworthy Android ransomware examples since 2014 is provided.
Read The Manual
Read The Manual
IS GDPR good or bad news for business?
IS GDPR good or bad news for business?
En Route with Sednit – Part 3: A Mysterious Downloader
En Route with Sednit – Part 3: A Mysterious Downloader
In the third and final part of our whitepaper “En Route with Sednit,” we describe a special downloader named Downdelph.
En Route with Sednit – Part 1: Approaching the target
En Route with Sednit – Part 1: Approaching the target
In the first part of our whitepaper “En Route with Sednit”, we focus on the methods used by the group to attack its targets, and on who these targets are.
En Route with Sednit – Part 2: Observing the Comings and Goings
En Route with Sednit – Part 2: Observing the Comings and Goings
In the second part of our whitepaper “En Route with Sednit”, we focus on Sednit’s espionage toolkit, which is deployed on targets deemed interesting after a reconnaissance phase (described in the first part of the whitepaper).
En Route with Sednit: Full Whitepaper
En Route with Sednit: Full Whitepaper
The full whitepaper “En Route with Sednit,” compiling parts 1-3.
Windows 10 security and privacy: An in-depth review and analysis
Windows 10 security and privacy: An in-depth review and analysis
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.