Press Center


Articles

March 17, 2009 | San Diego, CA

Support Requests

Just a reminder that we can't usually handle support issues here. Not that we want to be unhelpful, but the Research team simply isn't resourced for that sort of work.Someone just posted a problem they had with V.4 here, and I mailed them back, but the message bounced, so I'll summarize here.

March 12, 2009 | Bratislava

When Popularity Becomes Exploited: Infiltrations via USB Devices on Rise

Worms, such as WIn32/Agent and Win32/Agent.NFL were among the most frequent threats afflicting PC users across Europe, including the Czech Republic, Germany, Finland, Lithuania and Latvia. Yet another type of malware, namely WMA/TrojanDownloader.GetCodec.Gen has been dominant across a sizable portion of the continent, appearing in Austria, Sweden, Denmark, Switzerland, Greece, the Netherlands, Italy and Hungary.

February 26, 2009 | Bratislava

ESET launches the most effective solutions to combat malware

Today, ESET introduces a new generation of its security solutions, delivering its most effective protection against emerging threats. Built on the unique and time-tested ThreatSense® technology that has made ESET into a leader in proactive protection - ESET Smart Security® 4 and ESET NOD32 Antivirus® 4 - were optimized for even greater protection and enhanced usability, while retaining their signature small system footprint.

February 26, 2009 | Bratislava

New flaw in Excel exploited for targeted cyber attacks

Malware writers have created a malicious program exploiting unpatched vulnerability in some versions of MS Excel. ESET, a leading provider of security solutions – catalogues this malware as X97M/TrojanDropper.Agent.NAI. trojan.

February 18, 2009 | Bratislava

The Fourth Generation of ESET Security Solutions in the "Release Candidate" Version

As of today, ESET Smart Security 4 and ESET NOD32 Antivirus 4 are in the so-called "release candidte" phase, marking beginning of intensive testing prior to market release.

February 15, 2009 | Bratislava

April 1 and Conficker

Information and Removal tool.

February 3, 2009 | Bratislava

Careful with USB devices - they can transmit the most advanced computer threats

We have been detecting very high volumes of malware using the Windows Autorun facility for well over a year, along with gaming password-stealing malware, which again takes second place. Password stealers are still being seen in very high numbers, and shouldn't be perceived as  in decline. INF/Autorun is actually a very broad class of malware, since many kinds of malicious program use this approach to infection.

January 30, 2009 | San Diego, CA

Conficker Clarified

I just happened upon a blog that made an interesting point about the information that's been made about Conficker. Essentially, the writer was fulsome in her praise of an article by Gary Hinson here, which gave some simple advice on dealing with Conficker/Downadup. As it happens, I'm familiar with the name Gary Hinson: he also contributes to a blog here to which I also contribute occasionally, and has posted some excellent stuff there. In fact, Randy and I wrote a paper for AVAR last year that cites one of those posts (it should be available on our white papers page here soon).

January 23, 2009 | San Diego, CA

Confounding Conficker

[Update: Spiegl Online reports (in German!) that the total may be as high as 50 million infected machines: however, this figure seems to be extrapolated from the number of infections picked up Panda's online scanner. Statistically, I'm not sure it makes any sense at all to try to correlate this self-selecting sample to the total population of online  machines, though. (Thanks, Andreas, for drawing my attention to this item!) By the way, our own online scanner is here.]9.

January 22, 2009 | Bratislava

Vicious worm continues to spread threatening to grow into an epidemic

Win32/Conficker by ESET has ranked among the most wide-spread global threats already toward the end of last year. Compared to its original version, the variant is spreding even more agressively thanks to its ability to block signature updates of antivirus software. To increase its destructive power even further, its creators have added a function allowing it to spread by a way of USB key.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 |