• ESET vs Crypto-Ransomware: What, how and why?

    Crypto-ransomware (or filecoders) has been on the rise since at least 2013. Since then, cyber criminals have collected millions of US dollars by extorting money from victims in return for unlocking…

  • The State of SMB Cybersecurity in Canada 2016

    Client records, accounting history, trade secrets, personal information: what would happen to your business if hackers stole this data or held it for ransom?

  • ESET Technology: The multi-layered approach and its effectiveness

    In this document we summarize the ways in which ESET uses multi-layered technologies to go far beyond the capabilities of basic antivirus. We do this by explaining which layers are involved in solving…

  • Microsoft Windows® 10 Security and Privacy

    As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come. Microsoft has promised greater security in Windows. During the past 12…

  • Ransomware: How to keep your business safe from extortion malware

    Ransomware is malware that can lock a device or encrypt its contents in order to extort money from the owner in return for restoring access to those resources. This kind of malware can also have a…

  • Windows Exploitation in 2015

    In our previous report "Windows exploitation in 2014", we mentioned a major trend in modern cyberattacks called 0day (or 0-day, or zero-day) attacks. This term refers to attacks that take advantage of…