Press Center


Articles

June 7, 2016 | Athens, Greece

World after TeslaCrypt: Crysis family lays claim to parts of its territory

June 6, 2016 | Athens, Greece

ESET Named Lightest Among Internet Security Products

ESET Smart Security 9 received the highest score in AV-Comparatives’ Performance Test having the least impact on system performance among all tested security products.

June 3, 2016 | Athens, Greece

ESET detected a flaw in Windows that makes it hard to tackle DNS hijacking

ESET experts found a new version of the DNS Unlocker malware equipped with a unique capability to re-configure DNS settings on the victim’s computer.

May 26, 2016 | Athens, Greece

ESET Scored Best in New Anti-malware Protection Test

ESET Smart Security 9 is the only security solution with 100% protection, say the results of the first Home Anti-Malware Protection test by SE Labs.

May 19, 2016 | Athens, Greece

ESET Releases Decryptor for Recent Variants of TeslaCrypt Ransomware

ESET® released a decryptor for recent variants of the TeslaCrypt ransomware.

May 18, 2016 | Athens, Greece

Separatists in Ukraine targeted by cyber espionage

ESET researchers uncover an ongoing surveillance operation against separatists in Eastern Ukraine.

May 18, 2016 | Athens, Greece

Jigsaw ransomware 2.0: A fake or work in progress?

May 17, 2016 | Athens, Greece

ESET Maintains Its Position on the Security Software Market

Maker of award-winning ESET NOD32® technology maintains its ranking in the Endpoint Protection Platform market based on 2015 total market share revenue Worldwide.

May 6, 2016 | Athens, Greece

Forget about passwords: You need a passphrase!

Despite of the fact that more people than ever understand that cybercrime is a growing threat and that data breaches are commonplace, poor security practices are rife.

May 5, 2016 | Athens, Greece

Jigsaw and how ransomware is becoming more aggressive with new capabilities

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort. And the information stored by computers is much more important than we think, although many users only realize this when they lose access.

| 1 | 2 | 3 | 4 | 5 | ... | 29 | 30 | 31 |