Eset

Displaying 1-3 of 3 results

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset