Press Center


January 19, 2016 | Bratislava

ESET Earns ‘Top Rated’ Award from AV-Comparatives

ESET Smart Security 9 was named Top Rated in the AV-Comparatives Summary Report 2015, receiving six Advanced+ ratings from the independent testing organization.

AV-Comparativesw today publishes its annual Summary Report 2015 summarizing its tests and providing a market-wide overview of security products.

January 14, 2016 | Bratislava

ESET Named Top Player in Radicati Group’s Endpoint Security Market Quadrant 2015

ESET® was named Top Player in the latest Radicati Group’s “Endpoint Security – Market Quadrant 2015.”

January 13, 2016 | Bratislava

Nick FitzGerald Joins ESET as it Grows in Asia-Pacific Region

Nick FitzGerald, a renowned information security expert, is joining ESET as a Senior Research Fellow. Working with ESET Australia, he will focus on the whole Asia-Pacific region, including his home country, New Zealand.

January 5, 2016 | Singapore

Vietnamese Internet Users Worry About Online Threats – But Many Don’t Protect Themselves

ESET today releases the ESET Vietnam Cyber-Savviness Report 2015, which reveals that users in Vietnam are vulnerable to cyber threats because they have low cyber-security awareness and are not familiar with adequate preventive measures.

January 4, 2016 | Bratislava

ESET Finds Connection Between Cyber Espionage and Electricity Outage in Ukraine

Cyberattacks against energy companies in Ukraine in December 2015 are connected to attacks on media and targeted cyber-espionage against Ukrainian government agencies. Analyzing the KillDisk malware used in the attacks, ESET researchers found out that the new variant of this malware contained some additional functionality for sabotaging industrial systems.

December 17, 2015 | Bratislava

ESET Grows Faster than its Top 5 Peers and the Global Security Software Market as a Whole

ESET continues to gain market share in both the consumer and corporate segments of the Endpoint Security Software market.

With a growth rate of 7.7%, ESET increased its share of the global Endpoint Security Software market in 2014 to 4.6%, up from 4.4% the previous year.

December 17, 2015 | Sydney

Parenting In The Digital Age: The Concerns And The Realities

New study reveals how Aussie kids put themselves at risk online

More than a quarter of Australian children have engaged in risky behaviour online, with three percent of children having arranged to meet an online stranger in person. However, one in five parents are unconcerned about the possibility of online grooming.

August 24, 2015

ESET Report: Huge gap in cyber security knowledge leaves Asia vulnerable

ESET®, a global pioneer in proactive protection for more than two decades, today released the ESET Asia Cyber Savviness Report 2015 which shows that 93 percent of online users in Asia worry about cyber security.

The survey also underlines that the region still has a long way to go in understanding online security and protecting themselves. In fact, 3 out of 5 consumers are unable to answer basic cyber security questions correctly.

March 9, 2015 | Bratislava

Survey of IT Managers Highlights Top Cybersecurity Technology Concerns

Emphasis placed on usability to enable better, more efficient security.

ESET®, a global pioneer in proactive protection for more than two decades, today announced the results of a user survey identifying top cybersecurity technology concerns of IT managers. Overwhelmingly, the results spoke to the many different competing priorities within an enterprise IT environment, and managers’ and administrators’ need for tools that streamline processes and save them time.

March 5, 2015 | Bratislava

Syria Targeted by Cartoon Malware

ESET researcher analyzes Casper, the latest espionage malware by a cybercrime group responsible for Babar and Bunny.

The espionage group behind the infamous eavesdropping cartoon malware strikes again. After Bunny and Babar the Elephant, the cyber criminals have developed their latest piece of malware – Casper. This first-stage reconnaissance tool is able to send a detailed report about the victim’s infected machine to its controller.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | ... | 33 | 34 | 35 |