White Papers

90 reports

Six Months with Windows 8

Six Months with Windows 8

A look at Windows 8 during the first six months of its release. Just how well is it holding up, security-wise? The challenges faced by developers in securing Modern Windows and how piracy in the Windows Store might affect BYOD rollouts in the enterprise.


Advanced Evasion Techniques by Win32/Gapz

Advanced Evasion Techniques by Win32/Gapz

A presentation from the CARO workshop in May 2013, looking at the technology that makes Win32/Gapz arguably the most complex bootkit to date.


Boxer SMS Trojan

Boxer SMS Trojan

Analysis of an SMS Trojan found on Android smartphones that is capable of executing SMS premium rate scams in a wide range of countries. ESET researchers in Latin America combine code inspection with investigation of consumer forums to reveal the first threat of the kind targeting Latin American countries, but with implications that are global.


‘PokerAgent’

‘PokerAgent’

The ‘PokerAgent’ botnet, which we have tracked in 2012, was designed to harvest Facebook log-on credentials, also collecting information on credit card details linked to the Facebook account and Zynga Poker player stats, presumably with the intention to mug the victims. The threat was mostly active in Israel.


Trends for 2013 - Astounding growth of mobile malware

Trends for 2013 - Astounding growth of mobile malware

ESET Latin America's Malware Analysis Lab reviews the year and compiles threat trends for the upcoming season. So how will the 2013 threatscape look like according to the IT security company ESET? It will definitely see major growth of mobile malware and its variants, increased malware propagation via websites, continuing rise of botnets and attacks on the cloud resulting in information leaks.


The Passing Storm

The Passing Storm

The Storm botnet may have blown itself out, but its legacy remains. This paper places Storm in the context of botnets in general, examining its technical, social, and security implications.


Stuxnet Under the Microscope

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources. This is probably the last update of the document, but further relevant resources will be added to a list here.


ACAD/Medre.A

ACAD/Medre.A

10000‘s of AutoCAD Designs Leaked in Suspected Industrial Espionage.


Windows 8: FUD* for thought

Windows 8: FUD* for thought

An analysis of the newest and most interesting security features in Windows 8, Microsoft's newest desktop operating system, as well as how it may be attacked in the future.