Eset

Displaying 1-40 of 42 results

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset

  • Case Studies // Dec 2009

    ESET Case Study: Westwood One Tunes in ESET

    Westwood One is a large provider of network radio programming and one of the largest domestic providers of traffic information in the U.S. It was looking for a company to support older legacy systems. The culmination of that Internet research resulted in a discovery of ESET NOD23 Antivirus. Westwood One...

    Provided By Eset

  • Case Studies // Sep 2009

    ESET Case Study: San Diego Gastroenterology Medical Associates

    San Diego based Gastroenterology Medical Associates was founded in 1977 with two internal medicine doctors. It wasn't until 2004 that SDGMA's computers got connected to the Internet, so its antivirus history has been fairly brief. It decided to add ESET NOD32 Antivirus into its evaluation of new products. After comparing...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • Case Studies // Jul 2009

    ESET Case Study: AllCom Credit Union

    Laura Cummings is vice president of administration and electronic operations for AllCom Credit Union, a regional provider of savings and loan products located in Worcester, MA. Cummings is responsible for the networking and security across both Windows XP Pro SP and Windows Small Business 2003 platforms. However, the solution was...

    Provided By Eset

  • Case Studies // Jun 2009

    ESET Case Study: Sprague Energy

    Sprague Energy is one of the largest suppliers of energy and materials handling services in New England with products including home heating oil, diesel fuels, residual fuels, gasoline and natural gas. It stumbled onto a thread about corporate antivirus products, and specifically what people were switching to the most. The...

    Provided By Eset

  • Case Studies // May 2009

    ESET Case Study: Total Tech

    Founded in 2004, Total Tech is an Internet and network security solutions provider that helps protect and secure over 400 companies from network security threats. Total Tech has never supported any other antivirus company. Most deployments from Total Tech start with a free evaluation license for the customer, typically 30...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Reliance, LP

    With over 1,500 employees and 1.5 million customers, keeping the network humming is one of his top concerns. Selecting the right security software is an integral part of this process. Unfortunately, the AV software he inherited had some shortcomings. Reliance, LP deployed ESET NOD32 Antivirus - Business Edition. Once it...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Monadnock School District

    Monadnock School District wanted something that it could afford, and started to believe that antivirus solution wasn't right. Symantec had just come out with version 10 and it was causing all sorts of havoc with the Network Access Control. The updates were too bloated, the installation files too big. The...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Winnipeg School Division

    Kenn Olson is a divisional computer electronics technician for Winnipeg School Division (WSD), which provides educational programs and related services to approximately 34,000 students from Nursery to Grade 12. WSD had used a very well-known security vendor's antivirus program. It worked fine at first. When the old antivirus program changed...

    Provided By Eset

  • White Papers // Apr 2009

    Understanding and Teaching Heuristics

    This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry. Topics covered include signature based detection, generic signatures, passive heuristics, and active heuristics or emulation. A very basic compression algorithm is developed and taught so as to enhance...

    Provided By Eset

  • White Papers // Apr 2009

    The Root of All Evil? - Rootkits Revealed

    Public awareness of rootkits has risen in recent years, but as with worms, viruses and other forms of malicious software (malware), the term rootkit is applied unselectively to a range of technologies and has attracted a number of not-very-compatible definitions. While several of these technologies and definitions are explored in...

    Provided By Eset

  • White Papers // Apr 2009

    From Fun to Profit: The Evolution of Malware

    Digital threats have evolved from a bizarre hobby for computer geeks into a huge source of profit for organized cyber-crime. From a technical point of view, malware has diversified to enable pursuit of a wide variety of criminal objectives and has increased its capabilities for penetration into victim systems. Recognizing...

    Provided By Eset

  • White Papers // Apr 2009

    Testing Testing: Anti-Malware Evaluation for the Enterprise

    Anti-malware software remains an essential defensive component for most enterprises, understandably anxious to get the right balance of affordability and effectiveness. Unfortunately, journalists, consumer groups and security amateurs keep finding ever more creative and inappropriate ways to test detection focused software. This paper, attempts to address a number of core...

    Provided By Eset

  • White Papers // Apr 2009

    Net of the Living Dead: Bots, Botnets and Zombies

    Organized crime long ago discovered the Internet's profit potential, and has succeeded not only in recruiting the necessary expertise to exploit that potential, but in capturing and subverting a significant quantity of innocent Internet-attached systems and, in the process, acquiring the owners of those systems as unwitting Although they are...

    Provided By Eset

  • White Papers // Apr 2009

    People Patching: Is User Education of Any Use at All?

    In general, the anti-malware community splits dramatically into two camps when it comes to the evergreen debate about the effectiveness of user education and security awareness as a protective measure. One camp argues that "If education was of any use, it would have worked by now": the other says that...

    Provided By Eset

  • White Papers // Apr 2009

    The Spam-Ish Inquisition

    UCE is usually regarded as a subset of UBE, though it's a very considerable percentage of 'Spammy' email, and many simply use the term UCE interchangeably with 'Spam'. Bulk email such as newsletters and mailing lists don't usually count, since "Solicit" those communications by subscribing to the list. Unfortunately, there...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Archbold Medical Center

    Archbold Medical Center is comprised of five hospitals and four nursing homes, with more than 800 beds in and around Thomasville, Georgia. Until April 2007 medical center was using Symantec Enterprise Edition for antivirus protection. However it was soon on the lookout for a better solution. It decided to go...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Network Security Group, Inc.

    Network Security Group, Inc. is a network security solution provider and full service network security VAR focused on small-to medium-sized businesses. It was looking for a technologically superior product with a light footprint and minimal impact on network speed. As both Network Security Group and ESET have grown substantially in...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Regents Bank

    One of those challenges was of course to secure the network - protecting it from hackers, viruses, spyware, keyloggers and other Internet threats. Some problems started happening, and the level of customer service it was receiving from Trend started to deteriorate. It was already looking for an alternative, got the...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Sorrento Mesa Printing

    Sorrento Mesa Printing is located in San Diego, CA. Its business prints, ships and fulfills nationally and internationally for digital and off set printing. Prior to suffering its first infection, Sorrento Mesa Printing didn't think much about antivirus software. Sorrento deployed ESET NOD32 Antivirus that detected malware left resident by...

    Provided By Eset

  • Case Studies // Mar 2009

    Austrian Winemaker Pours Itself an ESET Solution

    Stutzenhofen, Austria - Georg Hugl, owner of Weinviertler Sektmanufaktur, relies on traditional methods of wine production, stressing the quality of its famous Goldstuck - the sparkling wine with 24 carat gold inside. It is only natural that he relies on quality products when deciding what to use in this compact...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: CSA

    CSA was founded in 1993 and became an ESET customer in December of 2002. It feels the way because it had spent time selling, installing and managing other solutions as well - including those of Symantec and McAfee. A customer of ours is part of an organization where they say...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Managed Service Provider - AppRiver

    AppRiver was founded in April 2002 with a handful of experts, an arsenal of technology, and one clear value proposition: to offer businesses of all sizes secure messaging solutions. Numerous Internet threats exist today, but viruses no longer keep AppRiver's Director of Network Infrastructure consumed at night. AppRiver deployed ESET...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Media - Dial Global Communications

    In August of 2007 Westwood One turned over the reins of that division to Dial Global. Dial Global's programming also includes feature and long form programming for all formats, hosted by legendary personalities like Rick Dees, Kid Kelly, Walt 'Baby' Love, Whitney Allen, Bob & Sheri, Mike Harvey and more....

    Provided By Eset

  • Case Studies // Mar 2009

    One of EU's Fastest Growing Companies Adopts ESET as a Corporate Standard

    Pamhagen, Austria - Elbacom, one of EMEA's largest and fastest-growing Windows Embedded Systems Microsoft Partners relies on ESET NOD32 Antivirus when executing its "IQ - Intelligence Quality / All in One Solution" and "Service with No Limits" philosophies. It not disturbed the work. This speaks to the quality of the...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Managed Service Provider - No Panic Computing

    No Panic Computing (NPC) specializes in secure mobile computing solutions for small business professionals. When it came time to select the security software component, NPC had one goal in mind that it didn't wanted it to run well and fast with no issues. NPC deployed ESET NOD32 Antivirus Business Edition.

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Babson College

    Babson College is located in Wellesley, MA, and best known for its nationally ranked entrepreneurship program. More than 1,700 undergraduate and 1,600 graduate students attend Babson, representing more than 48 states and 75 countries. In order to ensure stability at the client level, Sol creates standard images for every laptop...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Coronado Unified School District

    Coronado Unified is a K-12 school district located just south of downtown San Diego - on Coronado Island. It began finding that more viruses and other malware were penetrating his defenses and infiltrating the network. Coronado deployed NOD32 that catches more In-the-Wild viruses, has a much better management tool, and...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Keystone College

    Keystone College is a four-year institution with approximately 1,700 students. During the previous renewal cycle in 2004, Keystone evaluated Sophos and McAfee, and re-evaluated the Symantec package that had been in place for many years. Symantec ended up winning, but the decision was not without conflict. Keystone College deployed ESET...

    Provided By Eset

  • White Papers // Feb 2009

    ESET Smart Security 4 Product White Paper: Antivirus - Antispyware - Personal Firewall - Antispam

    The Internet is perhaps the greatest communication tool ever created. However, now that so many computers have an "Always-On" connection to the Internet, there is an unprecedented amount of malware designed to take advantage of this global and ever-expanding, public network. ESET Smart Security 4 is a thoroughly integrated anti-malware...

    Provided By Eset

  • White Papers // Feb 2009

    Free But Fake: Rogue Anti-Malware

    Most antivirus products are commercial and typically offer, as is the case with ESET solutions, free trial versions for a 30-day period. This limitation is the perfect excuse for criminals to recommend their "Free and magical" antivirus software which guarantees to solve problems that the user does not really have....

    Provided By Eset

  • White Papers // Jan 2009

    The Passing Storm: The Storm/Nuwar Botnet

    While security software can mitigate the direct impact of Nuwar and other bot-related malware on individual systems, the wider effects of botnet activity need additional countermeasures. DDoS attacks, for instance, may be somewhat mitigated by firewall, switch and router configuration. Local monitoring and blocking of SMTP traffic from systems other...

    Provided By Eset

  • White Papers // Nov 2008

    Global Threat Trends: November 2008

    Analysis of ESET's ThreatSense.Net, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 11.74% of the total, was scored by the INF/Autorun class of threat. It have been detecting very high volumes of malware using the Windows Autorun facility for well...

    Provided By Eset

  • White Papers // Oct 2008

    Who Will Test the Testers?

    The anti-malware industry has been plagued since its earliest days by one poorly designed comparative test after another. Contrast this then with the rather surprising fact that anyone with a computer, Internet access, a (perhaps rather undefined) 'Collection' of malware, and a little interest in the subject can open up...

    Provided By Eset

  • Case Studies // Sep 2009

    ESET Case Study: San Diego Gastroenterology Medical Associates

    San Diego based Gastroenterology Medical Associates was founded in 1977 with two internal medicine doctors. It wasn't until 2004 that SDGMA's computers got connected to the Internet, so its antivirus history has been fairly brief. It decided to add ESET NOD32 Antivirus into its evaluation of new products. After comparing...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Reliance, LP

    With over 1,500 employees and 1.5 million customers, keeping the network humming is one of his top concerns. Selecting the right security software is an integral part of this process. Unfortunately, the AV software he inherited had some shortcomings. Reliance, LP deployed ESET NOD32 Antivirus - Business Edition. Once it...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: CSA

    CSA was founded in 1993 and became an ESET customer in December of 2002. It feels the way because it had spent time selling, installing and managing other solutions as well - including those of Symantec and McAfee. A customer of ours is part of an organization where they say...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Network Security Group, Inc.

    Network Security Group, Inc. is a network security solution provider and full service network security VAR focused on small-to medium-sized businesses. It was looking for a technologically superior product with a light footprint and minimal impact on network speed. As both Network Security Group and ESET have grown substantially in...

    Provided By Eset

  • Case Studies // May 2009

    ESET Case Study: Total Tech

    Founded in 2004, Total Tech is an Internet and network security solutions provider that helps protect and secure over 400 companies from network security threats. Total Tech has never supported any other antivirus company. Most deployments from Total Tech start with a free evaluation license for the customer, typically 30...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • Case Studies // Dec 2009

    ESET Case Study: Westwood One Tunes in ESET

    Westwood One is a large provider of network radio programming and one of the largest domestic providers of traffic information in the U.S. It was looking for a company to support older legacy systems. The culmination of that Internet research resulted in a discovery of ESET NOD23 Antivirus. Westwood One...

    Provided By Eset

  • Case Studies // Jul 2009

    ESET Case Study: AllCom Credit Union

    Laura Cummings is vice president of administration and electronic operations for AllCom Credit Union, a regional provider of savings and loan products located in Worcester, MA. Cummings is responsible for the networking and security across both Windows XP Pro SP and Windows Small Business 2003 platforms. However, the solution was...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Managed Service Provider - AppRiver

    AppRiver was founded in April 2002 with a handful of experts, an arsenal of technology, and one clear value proposition: to offer businesses of all sizes secure messaging solutions. Numerous Internet threats exist today, but viruses no longer keep AppRiver's Director of Network Infrastructure consumed at night. AppRiver deployed ESET...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Media - Dial Global Communications

    In August of 2007 Westwood One turned over the reins of that division to Dial Global. Dial Global's programming also includes feature and long form programming for all formats, hosted by legendary personalities like Rick Dees, Kid Kelly, Walt 'Baby' Love, Whitney Allen, Bob & Sheri, Mike Harvey and more....

    Provided By Eset

  • Case Studies // Mar 2009

    One of EU's Fastest Growing Companies Adopts ESET as a Corporate Standard

    Pamhagen, Austria - Elbacom, one of EMEA's largest and fastest-growing Windows Embedded Systems Microsoft Partners relies on ESET NOD32 Antivirus when executing its "IQ - Intelligence Quality / All in One Solution" and "Service with No Limits" philosophies. It not disturbed the work. This speaks to the quality of the...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Managed Service Provider - No Panic Computing

    No Panic Computing (NPC) specializes in secure mobile computing solutions for small business professionals. When it came time to select the security software component, NPC had one goal in mind that it didn't wanted it to run well and fast with no issues. NPC deployed ESET NOD32 Antivirus Business Edition.

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Regents Bank

    One of those challenges was of course to secure the network - protecting it from hackers, viruses, spyware, keyloggers and other Internet threats. Some problems started happening, and the level of customer service it was receiving from Trend started to deteriorate. It was already looking for an alternative, got the...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Sorrento Mesa Printing

    Sorrento Mesa Printing is located in San Diego, CA. Its business prints, ships and fulfills nationally and internationally for digital and off set printing. Prior to suffering its first infection, Sorrento Mesa Printing didn't think much about antivirus software. Sorrento deployed ESET NOD32 Antivirus that detected malware left resident by...

    Provided By Eset

  • Case Studies // Jun 2009

    ESET Case Study: Sprague Energy

    Sprague Energy is one of the largest suppliers of energy and materials handling services in New England with products including home heating oil, diesel fuels, residual fuels, gasoline and natural gas. It stumbled onto a thread about corporate antivirus products, and specifically what people were switching to the most. The...

    Provided By Eset

  • Case Studies // Mar 2009

    Austrian Winemaker Pours Itself an ESET Solution

    Stutzenhofen, Austria - Georg Hugl, owner of Weinviertler Sektmanufaktur, relies on traditional methods of wine production, stressing the quality of its famous Goldstuck - the sparkling wine with 24 carat gold inside. It is only natural that he relies on quality products when deciding what to use in this compact...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Babson College

    Babson College is located in Wellesley, MA, and best known for its nationally ranked entrepreneurship program. More than 1,700 undergraduate and 1,600 graduate students attend Babson, representing more than 48 states and 75 countries. In order to ensure stability at the client level, Sol creates standard images for every laptop...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Coronado Unified School District

    Coronado Unified is a K-12 school district located just south of downtown San Diego - on Coronado Island. It began finding that more viruses and other malware were penetrating his defenses and infiltrating the network. Coronado deployed NOD32 that catches more In-the-Wild viruses, has a much better management tool, and...

    Provided By Eset

  • Case Studies // Mar 2009

    ESET Case Study: Keystone College

    Keystone College is a four-year institution with approximately 1,700 students. During the previous renewal cycle in 2004, Keystone evaluated Sophos and McAfee, and re-evaluated the Symantec package that had been in place for many years. Symantec ended up winning, but the decision was not without conflict. Keystone College deployed ESET...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Monadnock School District

    Monadnock School District wanted something that it could afford, and started to believe that antivirus solution wasn't right. Symantec had just come out with version 10 and it was causing all sorts of havoc with the Network Access Control. The updates were too bloated, the installation files too big. The...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Winnipeg School Division

    Kenn Olson is a divisional computer electronics technician for Winnipeg School Division (WSD), which provides educational programs and related services to approximately 34,000 students from Nursery to Grade 12. WSD had used a very well-known security vendor's antivirus program. It worked fine at first. When the old antivirus program changed...

    Provided By Eset

  • Case Studies // Apr 2009

    ESET Case Study: Archbold Medical Center

    Archbold Medical Center is comprised of five hospitals and four nursing homes, with more than 800 beds in and around Thomasville, Georgia. Until April 2007 medical center was using Symantec Enterprise Edition for antivirus protection. However it was soon on the lookout for a better solution. It decided to go...

    Provided By Eset

  • White Papers // Apr 2009

    Understanding and Teaching Heuristics

    This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry. Topics covered include signature based detection, generic signatures, passive heuristics, and active heuristics or emulation. A very basic compression algorithm is developed and taught so as to enhance...

    Provided By Eset

  • White Papers // Apr 2009

    The Root of All Evil? - Rootkits Revealed

    Public awareness of rootkits has risen in recent years, but as with worms, viruses and other forms of malicious software (malware), the term rootkit is applied unselectively to a range of technologies and has attracted a number of not-very-compatible definitions. While several of these technologies and definitions are explored in...

    Provided By Eset

  • White Papers // Feb 2009

    ESET Smart Security 4 Product White Paper: Antivirus - Antispyware - Personal Firewall - Antispam

    The Internet is perhaps the greatest communication tool ever created. However, now that so many computers have an "Always-On" connection to the Internet, there is an unprecedented amount of malware designed to take advantage of this global and ever-expanding, public network. ESET Smart Security 4 is a thoroughly integrated anti-malware...

    Provided By Eset

  • White Papers // Apr 2009

    From Fun to Profit: The Evolution of Malware

    Digital threats have evolved from a bizarre hobby for computer geeks into a huge source of profit for organized cyber-crime. From a technical point of view, malware has diversified to enable pursuit of a wide variety of criminal objectives and has increased its capabilities for penetration into victim systems. Recognizing...

    Provided By Eset

  • White Papers // Apr 2009

    Testing Testing: Anti-Malware Evaluation for the Enterprise

    Anti-malware software remains an essential defensive component for most enterprises, understandably anxious to get the right balance of affordability and effectiveness. Unfortunately, journalists, consumer groups and security amateurs keep finding ever more creative and inappropriate ways to test detection focused software. This paper, attempts to address a number of core...

    Provided By Eset

  • White Papers // Jan 2009

    The Passing Storm: The Storm/Nuwar Botnet

    While security software can mitigate the direct impact of Nuwar and other bot-related malware on individual systems, the wider effects of botnet activity need additional countermeasures. DDoS attacks, for instance, may be somewhat mitigated by firewall, switch and router configuration. Local monitoring and blocking of SMTP traffic from systems other...

    Provided By Eset

  • White Papers // Nov 2008

    Global Threat Trends: November 2008

    Analysis of ESET's ThreatSense.Net, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 11.74% of the total, was scored by the INF/Autorun class of threat. It have been detecting very high volumes of malware using the Windows Autorun facility for well...

    Provided By Eset

  • White Papers // Apr 2009

    Net of the Living Dead: Bots, Botnets and Zombies

    Organized crime long ago discovered the Internet's profit potential, and has succeeded not only in recruiting the necessary expertise to exploit that potential, but in capturing and subverting a significant quantity of innocent Internet-attached systems and, in the process, acquiring the owners of those systems as unwitting Although they are...

    Provided By Eset

  • White Papers // Oct 2008

    Who Will Test the Testers?

    The anti-malware industry has been plagued since its earliest days by one poorly designed comparative test after another. Contrast this then with the rather surprising fact that anyone with a computer, Internet access, a (perhaps rather undefined) 'Collection' of malware, and a little interest in the subject can open up...

    Provided By Eset

  • White Papers // Oct 2008

    A Dose by Any Other Name

    Years ago, when alt.comp.virus was still useful, 'Name that virus' was a popular virtual party game, and virus names were, if not standardized, at least easy to cross-reference with tools like VGrep. It is important to try to keep customer expectations realistic. The glut problem can't be fixed by throwing...

    Provided By Eset

  • White Papers // Apr 2009

    People Patching: Is User Education of Any Use at All?

    In general, the anti-malware community splits dramatically into two camps when it comes to the evergreen debate about the effectiveness of user education and security awareness as a protective measure. One camp argues that "If education was of any use, it would have worked by now": the other says that...

    Provided By Eset

  • White Papers // Apr 2009

    The Spam-Ish Inquisition

    UCE is usually regarded as a subset of UBE, though it's a very considerable percentage of 'Spammy' email, and many simply use the term UCE interchangeably with 'Spam'. Bulk email such as newsletters and mailing lists don't usually count, since "Solicit" those communications by subscribing to the list. Unfortunately, there...

    Provided By Eset

  • White Papers // Feb 2009

    Free But Fake: Rogue Anti-Malware

    Most antivirus products are commercial and typically offer, as is the case with ESET solutions, free trial versions for a 30-day period. This limitation is the perfect excuse for criminals to recommend their "Free and magical" antivirus software which guarantees to solve problems that the user does not really have....

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Oct 2008

    Understanding and Teaching Bots and Botnets

    Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? The second in the 'Understanding and teaching...' series, this paper is designed to both educate those who are not familiar with the topic or have misconceptions, and at the same time to...

    Provided By Eset