Newsroom

ESET discovers dangerous malware designed to disrupt industrial control systems

Industroyer: Malware likely responsible for 2016 Ukrainian power grid attack, biggest threat to industrial control systems since Stuxnet

Latest Press Releases

ESET Presents Industroyer Findings at Black Hat 2017

Senior researchers from ESET provided technical details and discussed implications of malware designed to target industrial control systems.

The Channel is Booming: ESET Announces 40% Channel Partner Growth and Launch of Partner Council

ESET®, a global pioneer in IT security celebrating its 30-year anniversary, announced today its record year-over-year channel growth with a 40 percent increase in channel partners in the last 12...

Calling all nonprofits: ESET to award $30k in prize money with “Nonprofit Pitch Fest” to help usher in its 30-year anniversary

This year, ESET celebrates 30 years of its continuous innovation in IT security. As part of the company’s commitment to continue to build a safer digital world, ESET is launching a Nonprofit Pitch...

ESET to highlight groundbreaking research findings at Black Hat 2017

This year at Black Hat (July 22–27, 2017, in Las Vegas, NV), the world’s leading information security event, IT security firm ESET will lead two important sessions.  

The first is ESET’s...

Corporate Blog

Mr. Robot and the risks of a future in virtual currency

Last year’s Comic-Con installation for Mr. Robot took us on a journey through a Mr. Robot storefront and then into the room (and mind) of Elliot Alderson, played by Rami Malek. This year, we stopped...

What will our cities look like 30 years from now? Blade Runner 2049 experience at Comic-Con makes a guess

What will our cities look like 30 years from now? What kind of technology will they use, and will EVERYTHING truly be connected? Many futurists believe they will. From automated cars to retinal...

What you need to know about “dark markets” since law enforcement take down

Anyone accustomed to using the internet to make illegal purchases of illicit goods – including malicious code – is probably feeling anxious today. Why? Because a combined law enforcement effort has...

ESET Endpoint Security earns a 5-star rating from SC Magazine

Reviewers praised ESET Endpoint Security’s accurate detection, speed and comprehensive management tools in this July 5, 2017 review. The same technologies are used in ESET business and home products.

ESET In the News

ESET, a leading authority on all things cybersecurity, is regularly used as a source for top publications around the world.

To reach an ESET cybersecurity expert for an interview or speaking
engagement request, please contact pr@eset.com

Videos

ESET Internet Security Product Video

Learn about the new features in version 10 of ESET's Internet Security for Windows.

Enjoy Safer Technology with ESET

Technology is in every single part of our life and it's fantastic. It's the Future. Enjoy Safer Technology and get ready to have the time of your life. "What we're trying to do, is help people to live...

ESET Smart Security Product Video

Learn about the new features in version 8 of ESET's Internet security suite product for Windows.

 

Enjoy Safer Technology with ESET (SHORT)

Technology is in every single part of our life and it's fantastic. It's the Future. Enjoy Safer Technology and get ready to have the time of your life. "What we're trying to do, is help people to live...

We Live Security

News and research from ESET security researchers around the globe.

Homograph attacks: Don’t believe everything you see

A homograph attack is what happens when attackers register domains that are similar to the originals, with valid certificates.

Black Hat 2017 industrial hacking: The song remains the same

If industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.

Black Hat 2017: Non-standard hacking platforms reign supreme

This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.

Is it safe to store corporate information on Google Drive (or similar services)?

When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.

Press Kit

Follow ESET on Social Media