Computer Security White Papers and Reports

Torrent Locker: Ransomware in a Country Near You

Win32/Filecoder.DI, also known as TorrentLocker, encrypts its victims’ valuable documents and demands that the victims pay a ransom so that they can download the decryption software that will unlock their files.

Download

Mind the Gapz

The most complex Bootkit ever analysed?

Download

Origin of the suspicious

Information wants to be free. Unfortunately, false information doesn’t spend nearly enough time behind bars, except those bars that specialise in old whines in new bottles. Welcome to the Web 2.0 incarnation of the Misinformation Superhighway. Did you really think that hoaxing had died out?

Download

ESET Threat Trends for 2013 - Growth of Mobile Malware

At the end of each year, ESET with its global security research resources, reviews the year and compiles threat trends for the upcoming season. So how will the 2013 threatscape look according to the IT security company ESET? It will definetely see major growth of mobile malware and its variants, increased malware propagation via websites, continuing rise of botnets and attacks on the cloud resulting in information leaks.

Download

Six Months with Windows 8

Microsoft® Windows 8 has just reached its six-month anniversary, and we at ESET thought now would be a good time to review where things stand with the latest incarnation of Microsoft’s flagship operating system. ESET-the-company has been staying on top of Windows 8 security, but what has the experience been like for ESET’s customers so far?

Download

What is a potentially unwanted application (PUA)?

This paper was started as the result of a rather innocuous request: A new co-worker asked me to explain to him what the class of software ESET calls Potentially Unwanted Applications (PUAs)—also known as Potentially Unwanted Programs (PUP) or Potentially Unwanted Software (PUS)—did. While he was already familiar with some malicious types of software such as computer viruses and worms, he wanted to understand the difference between the outright threats posed by these types of malware and those which are classified as being potentially unwanted. So, with question that in mind, just what is a potentially unwanted application?

Download

Twenty Years Before The Mouse

Written in the form of a personal retrospective, this paper compares the earliest days of PC computer viruses with today’s threats, as well as provides a glimpse into the origins of the computer anti-virus industry.

Download

BYOD- Empowering Users, Not Weakening Security

Bring Your Own Device (BYOD) is taking the corporate world by storm, spurred on by users that want to be able to use the technology they are most comfortable with and frequently perceive as being better than that provided by their employer. Organisations seeing the cost and productivity benefits also want to take advantage of BYOD, but here lies the issue. Until now, many businesses have only made a passing glance at securing mobile phones. Smartphones and tablets have changed the threat landscape, yet few businesses have updated their polices – or their security.

Download

Cutting Budgets Without Cutting Security

How choosing the right antivirus can save your business and your budget

Download

Cybercrime Coming of Age

ESET Latin America’s document forecasts the continuing shift of the most malware attacks to the Internet.

Download

Ten Ways to Dodge CyberBullets

Around New Year it seems that everyone wants a top 10: the top 10 most stupid remarks made by celebrities, the 10 worstdressed French poodles, the 10 most embarrassing political speeches and so on. We revisited some of the ideas that our Research team at ESET North America came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity."

Download

Trends for 2011 - Botnets and Dynamic Malware

Researchers from ESET's Laboratories in Latin America summarize the main trends anticipated for 2011 in malicious programs and antivirus security.

Download

Essential Security Against Evolving Threats

Security is no longer optional and has become an absolute need for the successful running of today's businesses. However, the selection of the right partner is crucial to ensure complete protection from current and future threats.

Download

Understanding and Teaching Heuristics

This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.

Download

Hodprot-Report

Banking fraud in Russia, Win32/Hodprot Overview, Installation Details, The Dropped Modules, Setupapi.dll – DLL Hijacking, Sfc.sys – Kernel-mode Injector, The bot, The main module, Network communication

Download

IDC vendor Spotlight

Beyond Signature-Based Ant ivirus: New Threat Vectors Drive Need for Proactive Ant imalware Protection

Download

Securing the mobile enterprise

The traditional network perimeter is more elastic than ever before. Mobile devices such as tablets and smartphones are capable of so many day-to-day computing tasks that they are gradually assuming a primary role in the device portfolio. Employees are increasingly expecting to use their own devices on the corporate network.

Download

Endpoint Security: Proactive Solutions for Networkwide Platforms

Most antivirus products are commercial and typically offer, as is the case with ESET® solutions, free trial versions for a 30-day period.

Download

The first malware to infect hundreds of thousands of Apple Mac

Flashback is a threat on the OS X platform which was detected for the first time in the fall of 2011 [1]. After staying unnoticed for several months, Flashback attracted general attention in April 2012 by managing to infect over 500,000 computers. How could the rate of infection have been so high? Are the techniques for obfuscating Flashback as complex as those we generally associate with Windows malware? What was the perpetrator’s intention?

Download

Choosing Your Password

Some ways of avoiding easily guessable passwords.

Download

Online Shopping and a Phishing Pheeding Phrenzy

In fact, according to the Anti-­‐Phishing Working Group’s most recent report, while the number of PCs infected by phishing malware was decreasing in the first quarter of 2012, the number of unique phishing sites flagged by the APWG reached an all-­‐time high of 56,859 in February, with another all time high of 392 targeted brands in February and March.

Download

Problematic, Unloved and Argumentative

What is a potentially unwanted application (PUA)? This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.

Download

Free but Fake: Rogue Anti-malware

Most antivirus products are commercial and typically offer, as is the case with ESET® solutions, free trial versions for a 30-day period.

Download

SAME BOTNET, SAME GUYS, NEW CODE

Win32/Kelihos fi rst appeared at the very end of 2010. There are many things that make this malware stand out. First of all, it uses a custom peer-to-peer network protocol. It also shares many similarities in terms of code and endgame with Win32/Nuwar (the infamous Storm worm) and Win32/Waledac. These resemblances lead us to think the same gang is behind the creation, and possibly the operation, of all three pieces of malware.

Download

Stuxnet Under the Microscope

Version 1.31 of a comprehensive analysis of the Stuxnet phenomenon, updated to add pointers to additional resources.

Download

The Evolution of TDL: Conquering x64

It has been about two years since the Win32/Olmarik (also known as TDSS, TDL and Alureon) family of malware programs started to evolve. The authors of the rootkit implemented one of the most sophisticated and advanced mechanisms for bypassing various protective measures and security mechanisms embedded into the operating system...

Download

Hanging on the telephone

Antivirus cold-calling support scams

Download

A Tried and True Weapon: Social Engineering

A discussion of some of the ways in which attackers use psychological manipulation to trick their victims.

Download

Westcoast Labs

ESET Smart Security Business Edition Comparative Testing

Download

Windows 8: FUD* for thought

In September of 2011, Microsoft released the first public preview of Windows 8, the next generation of their flagship desktop operating system, at the BUILD Developer Conference 1, 2. Despite a flurry of pre-Microsoft leaks, interest in Windows 8 remained high, and the official release of the Windows 8 Developer Preview received a groundswell of attention in blogs, articles and elsewhere. A subsequent release, titled Consumer Preview, was released at the end of February 2012. While it contained some GUI changes, such as removal of the Start button from the taskbar, most of the changes to it were internal. Three months later, at the end of May, the Release Preview of Microsoft Windows 8 was released, with the user interface, feature set and APIs being close to (if not already) final. Much of the interest in Windows 8 focuses on cosmetic changes, such as the new modern Windows 8 interface (formerly known as the Metro user interface) and replacement of the Start Menu with the Start Screen, but substantial improvements have been made to Windows security, as well. In this white paper, we will look at some of these changes, and what they mean to Windows 8’s users.

Download