May 29, 2012 | San Diego, CA

Win32/Flamer: the 21st Century Whale

It’s not only the malware ESET calls Win32/Flamer.A which is complex (and certainly dauntingly large).It's understandable that what appears to be a sophisticated threat found in in several regions, some of them particularly politically sensitive, has excited so much interest. However, conflicting conjecture and confusion over the ‘ownership’ of the detection is muddying the waters somewhat.

May 29, 2012 | Bratislava

ESET Launches Next Generation Business Endpoint Solutions: ESET Endpoint Antivirus and ESET Endpoint Security with Web Control

ESET, the leader in proactive protection celebrating 25 years of its technology this year, today announced the launch of a new line of products for business customers – ESET Endpoint Security and ESET Endpoint Antivirus. With the new product line, ESET is strengthening its focus on the business segment. Both ESET Endpoint Antivirus and ESET Endpoint Security come standard with ESET Remote Administrator. The more feature-rich ESET Endpoint Security adds Web Control, Two-way Firewall and Client Antispam.

May 17, 2012 | Bratislava

ESET Releases BETA Versions of ESET NOD32 Antivirus 6 and ESET Smart Security 6 with Anti-Theft

ESET, the leader in proactive protection against cyber-threats, today announced the start of public BETA testing of its flagship products − ESET Smart Security 6 BETA and ESET NOD32 Antivirus 6 BETA. The Anti-Theft feature that helps locate missing laptops and monitors activity on stolen devices will be available in both products during the BETA stage to reach as many testers as possible. ESET BETA Program is a final phase in the release process when products are available for testing to the general public. Both ESET Smart Security 6 and ESET NOD32 Antivirus 6 are available for free download.

May 12, 2012 | San Diego, CA

11 Tips for protecting your data when you travel

When we relayed the FBI/IC3 warning to travelers about a threat involving hotel Internet service overseas last week it produced a lot of requests for advice on how to respond to the threat. So a few of us researchers at ESET came up with a list of data security tips for travelers. These tips will help you keep your data safe while travelling in general, and defeat this particular threat (IC3 says a pop-up appears as you are signing in to the hotel Internet and asks you to update perform a software which is actually a malware infection).Below the list are some additional strategies and one example of what not to do with your laptop and your car, wherever you happen to be driving.

May 9, 2012 | San Diego, CA

Foreign Travel Malware Threat Alert: Watch out for hotel Internet connections

We received a worrying notice today from the Internet Crime Complaint Center (IC3) which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), The headline reads: "Malware Installed on Travelers' Laptops Through Software Updates on Hotel Internet Connections." We felt that the warning which followed the headline was serious enough to relay it promptly to our readers in its entirety:Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms.Recently, there have been instances of travelers' laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to setup the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product.

April 15, 2012 | San Diego, CA

How to recognize a PC support scam

A while ago, I responded to a blog comment promising some thoughts on how to recognize a cold-calling PC support scam. Unfortunately, I wasn't able to do that immediately, and then I was on vacation with no Internet connectivity (I should do that more often!). But then, since the problem isn't going to disappear any time soon, I guess advice on how to recognize it before you hand over any cash isn't going to pass its best-by date too soon, either.If you have caller-ID enabled on your phone display, you may see International or Number Withheld.

April 5, 2012 | San Diego, CA

Mac Flashback Trojan: If you use Java the time to patch your Mac is now

If you are a Mac user and you have Java installed on your Mac, then right now would be a good time to run Software Update… from the Apple menu to make sure you have installed the latest Java for Mac OS X update. Installing this update will help protect your Mac from a malicious software attack being referred to in the media as Mac Flashback Trojan. News of the Mac Flashback Trojan attack has been spreading rapidly and with good reason; this software exploits Java to seriously compromise sensitive data such as usernames and passwords. (Note: Even though users of ESET Cybersecurity for Mac are already protected against this latest version of OSX/Flashback, as well as previous versions, we still recommend that you perform this update right away.

March 14, 2012 | San Diego, CA

Google’s data mining bonanza and your privacy: an infographic

Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you probably know that on March 1, 2012, the world's largest collector of personal data, Google, changed the way it uses information about you. But how big of a deal is this? And what, if anything, should you be doing differently today to protect data that Google may be collecting about you?Let's start answering those questions by picturing just how much data about its users Google has the potential to tap.

March 6, 2012 | San Diego, CA

Changing how people see the malware threat: images can make a difference

This is a just a short post to make available the security awareness slides that I was using at the RSA Conference in San Francisco last week. Several people asked me for copies to use in their own awareness efforts and I am more than happy to oblige. I believe these slides can be effective in changing the way people perceive the threat of malicious software.My operating hypothesis is that the sooner everyone–from CEOs to employees, kids to grandparents–understands that malicious software–viruses, Trojans, worms, or whatever–are the work of a rogue industry, not a roguish teenager, the sooner we can convince individuals and organizations to effectively implement the necessary counter-measures.

March 5, 2012 | San Diego, CA

Security professionals DO use anti-virus

It was back in the 1990s when someone told me that operating systems like Windows NT were getting so safe that AV would soon be out of business. And I hear on a regular basis that AV is so ineffective it's not worth having. Because I get some of my income from the anti-virus industry, no doubt you'd expect me to disagree. I do, but that's not why.

| 1 | 2 | 3 |