White Papers

  • Protecting Enterprise

    An examination of bugs, major vulnerabilities and exploits

  • IoT and privacy by design in the smart home

    Each “thing” in the term “Internet of Things” refers to a device, and there are many types of connectable device. The smart home for most of us will be a small foray into the world of IoT, with a...

  • Cybersecurity trends 2018: The cost of our connected world

    ESET security experts present the areas that they expect to be leading security priorities

    in the upcoming year and suggest ways to mitigate the possible risk that they pose.

  • Is machine learning cybersecurity's silver bullet?

    At a point in history where information is more accessible than ever before and facts can be easily checked, it’s ironic that misinformation is proliferating. At a time when information is more...

  • ESET vs Crypto-Ransomware: What, how and why?

    Crypto-ransomware (or filecoders) has been on the rise since at least 2013. Since then, cyber criminals have collected millions of US dollars by extorting money from victims in return for unlocking...

  • Is GDPR good or bad news for business?

    Recent years have brought major advances in I.T. and fundamental changes to the ways in which individuals and organizations communicate and share information. To achieve harmonization, a new single...