Press Center


Articles

July 14, 2016 | Athens, Greece

ESET discovered bogus apps at Google Play which promise new followers

ESET researchers have discovered eight Google Play apps tricking users into downloading them, luring users into paying perpetual subscriptions, sharing their personal information, consenting to the receipt of marketing messages or watching ads. Hiding their true functionality, most of the apps promised to increase the number of the victim’s social network followers.

July 12, 2016 | Athens, Greece

Nymaim rides again from Europe to the Americas

In 2016 Nymaim malware resurfaced and is spreading via an intensive spearphising campaign utilizing malicious Microsoft Word attachments.

July 11, 2016 | Athens, Greece

Hi, I'm the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest.

July 7, 2016 | Athens, Greece

ESET investigates keydnap a new backdoor stealing credentials on OS X

ESET researchers have been looking into OSX/Keydnap, a Trojan stealing passwords and keys out of OSX keychains by creating a permanent backdoor. While still not clear how victims become exposed, it is thought that it could be spread via attachments in spam messages, downloads from untrusted websites or other vectors.

July 5, 2016 | Athens, Greece

Data leak dangers: Know your weak spots

Data leaks and breaches are alarmingly common, but there are still many misconceptions as to how and why they happen.

July 1, 2016 | Athens, Greece

How to secure your social media accounts

Courtesy of Facebook, Twitter, Instagram and Snapchat – to name but a few – we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has, without a shadow of a doubt, become central to our way of life.

July 1, 2016 | Athens, Greece

Espionage in Central and Eastern Europe: Governmental data extracted by a malicious toolkit

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on economic growth and cooperation in Central and Eastern Europe.

June 29, 2016 | Athens, Greece

Digital patch kit: How to protect yourself from data leaks

Data leaks, as we will explore in an upcoming feature, can emerge in numerous ways. Knowing where your weak spots are as organization is, of course, important, but equally, ensuring that you actively do everyone you can to stay secure is vital to ensure you are protected.

June 29, 2016 | Athens, Greece

Staying cyber safe on the road? Ten tips for this summer season

June 27, 2016 | Athens, Greece

Cash machines turn 49 today. Are ATM really that secure?

Forty-nine years ago, if you needed cash you had to head to your bank and request it from the clerk at the counter. But on the 27th of June 1967, all that changed. On that day Londoners had their first opportunity to withdraw funds from their accounts via a new specialized cash machine, which later became known as an automated teller machine, or ATM for short.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | ... | 33 | 34 | 35 |