Press Center


July 15, 2016 | Athens, Greece

Pokémon GO craze: ESET warns of fake apps

ESET researchers have discovered fake apps on Google Play targeting Pokémon GO’s hungry hordes. Among them is the first ever fake lockscreen app on Google Play and two scareware apps.

July 15, 2016 | Athens, Greece

Fake apps on Google Play tricked users into paying instead of delivering promised followers

Many malicious developers try to trick users into downloading their apps by creating the illusion of a useful application. They accomplish it by creating a very interesting app name and adding a bogus description that does not match the functionality of the application.

July 14, 2016 | Athens, Greece

ESET discovered bogus apps at Google Play which promise new followers

ESET researchers have discovered eight Google Play apps tricking users into downloading them, luring users into paying perpetual subscriptions, sharing their personal information, consenting to the receipt of marketing messages or watching ads. Hiding their true functionality, most of the apps promised to increase the number of the victim’s social network followers.

July 12, 2016 | Athens, Greece

Nymaim rides again from Europe to the Americas

In 2016 Nymaim malware resurfaced and is spreading via an intensive spearphising campaign utilizing malicious Microsoft Word attachments.

July 11, 2016 | Athens, Greece

Hi, I'm the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest.

July 7, 2016 | Athens, Greece

ESET investigates keydnap a new backdoor stealing credentials on OS X

ESET researchers have been looking into OSX/Keydnap, a Trojan stealing passwords and keys out of OSX keychains by creating a permanent backdoor. While still not clear how victims become exposed, it is thought that it could be spread via attachments in spam messages, downloads from untrusted websites or other vectors.

July 5, 2016 | Athens, Greece

Data leak dangers: Know your weak spots

Data leaks and breaches are alarmingly common, but there are still many misconceptions as to how and why they happen.

July 1, 2016 | Athens, Greece

How to secure your social media accounts

Courtesy of Facebook, Twitter, Instagram and Snapchat – to name but a few – we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has, without a shadow of a doubt, become central to our way of life.

July 1, 2016 | Athens, Greece

Espionage in Central and Eastern Europe: Governmental data extracted by a malicious toolkit

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on economic growth and cooperation in Central and Eastern Europe.

June 29, 2016 | Athens, Greece

Digital patch kit: How to protect yourself from data leaks

Data leaks, as we will explore in an upcoming feature, can emerge in numerous ways. Knowing where your weak spots are as organization is, of course, important, but equally, ensuring that you actively do everyone you can to stay secure is vital to ensure you are protected.

| 1 | 2 | 3 | ... | 7 | 8 | 9 | 10 | 11 | ... | 37 | 38 | 39 |