ESET Virtualization security solutions for business banner

White Papers

  • ESET Technology: The multi-layered approach and its effectiveness

    In this document we summarize the ways in which ESET uses multi-layered technologies to go far beyond the capabilities of basic antivirus. We do this by explaining which layers are involved in solving...

  • Microsoft Windows® 10 Security and Privacy

    As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come. Microsoft has promised greater security in Windows. During the past 12...

  • Trends 2017: Security held ransom

    What does 2017 have in store for cybersecurity—and will you be prepared? See what to expect in terms of threats, trends and global developments with ESET's annual forecast.

  • Ransomware: How to keep your business safe from extortion malware

    Ransomware is malware that can lock a device or encrypt its contents in order to extort money from the owner in return for restoring access to those resources. This kind of malware can also have a...

  • Windows Exploitation in 2015

    In our previous report "Windows exploitation in 2014", we mentioned a major trend in modern cyberattacks called 0day (or 0-day, or zero-day) attacks. This term refers to attacks that take advantage of...

  • Dissecting Linux/Moose

    Linux/Moose is a malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path. The compromised devices are used to steal ...