White Papers

  • Microsoft Windows® 10 Security and Privacy

    As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come. Microsoft has promised greater security in Windows. During the past 12...

  • Trends 2017: Security held ransom

    What does 2017 have in store for cybersecurity—and will you be prepared? See what to expect in terms of threats, trends and global developments with ESET's annual forecast.

  • Ransomware: How to keep your business safe from extortion malware

    Ransomware is malware that can lock a device or encrypt its contents in order to extort money from the owner in return for restoring access to those resources. This kind of malware can also have a...

  • Windows Exploitation in 2015

    In our previous report "Windows exploitation in 2014", we mentioned a major trend in modern cyberattacks called 0day (or 0-day, or zero-day) attacks. This term refers to attacks that take advantage of...

  • Dissecting Linux/Moose

    Linux/Moose is a malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path. The compromised devices are used to steal ...

  • The State of Cybersecurity in Healthcare Organizations in 2016

    Healthcare organizations are in the cross hairs of cyber attackers as evidenced in the 2016 State of Cybersecurity in Healthcare Organizations Study sponsored by ESET. On average, healthcare...