Eset

Displaying 1-18 of 18 results

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • White Papers // Apr 2009

    Understanding and Teaching Heuristics

    This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry. Topics covered include signature based detection, generic signatures, passive heuristics, and active heuristics or emulation. A very basic compression algorithm is developed and taught so as to enhance...

    Provided By Eset

  • White Papers // Apr 2009

    The Root of All Evil? - Rootkits Revealed

    Public awareness of rootkits has risen in recent years, but as with worms, viruses and other forms of malicious software (malware), the term rootkit is applied unselectively to a range of technologies and has attracted a number of not-very-compatible definitions. While several of these technologies and definitions are explored in...

    Provided By Eset

  • White Papers // Apr 2009

    From Fun to Profit: The Evolution of Malware

    Digital threats have evolved from a bizarre hobby for computer geeks into a huge source of profit for organized cyber-crime. From a technical point of view, malware has diversified to enable pursuit of a wide variety of criminal objectives and has increased its capabilities for penetration into victim systems. Recognizing...

    Provided By Eset

  • White Papers // Apr 2009

    Testing Testing: Anti-Malware Evaluation for the Enterprise

    Anti-malware software remains an essential defensive component for most enterprises, understandably anxious to get the right balance of affordability and effectiveness. Unfortunately, journalists, consumer groups and security amateurs keep finding ever more creative and inappropriate ways to test detection focused software. This paper, attempts to address a number of core...

    Provided By Eset

  • White Papers // Apr 2009

    Net of the Living Dead: Bots, Botnets and Zombies

    Organized crime long ago discovered the Internet's profit potential, and has succeeded not only in recruiting the necessary expertise to exploit that potential, but in capturing and subverting a significant quantity of innocent Internet-attached systems and, in the process, acquiring the owners of those systems as unwitting Although they are...

    Provided By Eset

  • White Papers // Apr 2009

    People Patching: Is User Education of Any Use at All?

    In general, the anti-malware community splits dramatically into two camps when it comes to the evergreen debate about the effectiveness of user education and security awareness as a protective measure. One camp argues that "If education was of any use, it would have worked by now": the other says that...

    Provided By Eset

  • White Papers // Apr 2009

    The Spam-Ish Inquisition

    UCE is usually regarded as a subset of UBE, though it's a very considerable percentage of 'Spammy' email, and many simply use the term UCE interchangeably with 'Spam'. Bulk email such as newsletters and mailing lists don't usually count, since "Solicit" those communications by subscribing to the list. Unfortunately, there...

    Provided By Eset

  • White Papers // Feb 2009

    ESET Smart Security 4 Product White Paper: Antivirus - Antispyware - Personal Firewall - Antispam

    The Internet is perhaps the greatest communication tool ever created. However, now that so many computers have an "Always-On" connection to the Internet, there is an unprecedented amount of malware designed to take advantage of this global and ever-expanding, public network. ESET Smart Security 4 is a thoroughly integrated anti-malware...

    Provided By Eset

  • White Papers // Feb 2009

    Free But Fake: Rogue Anti-Malware

    Most antivirus products are commercial and typically offer, as is the case with ESET solutions, free trial versions for a 30-day period. This limitation is the perfect excuse for criminals to recommend their "Free and magical" antivirus software which guarantees to solve problems that the user does not really have....

    Provided By Eset

  • White Papers // Jan 2009

    The Passing Storm: The Storm/Nuwar Botnet

    While security software can mitigate the direct impact of Nuwar and other bot-related malware on individual systems, the wider effects of botnet activity need additional countermeasures. DDoS attacks, for instance, may be somewhat mitigated by firewall, switch and router configuration. Local monitoring and blocking of SMTP traffic from systems other...

    Provided By Eset

  • White Papers // Nov 2008

    Global Threat Trends: November 2008

    Analysis of ESET's ThreatSense.Net, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 11.74% of the total, was scored by the INF/Autorun class of threat. It have been detecting very high volumes of malware using the Windows Autorun facility for well...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • White Papers // Apr 2009

    Understanding and Teaching Heuristics

    This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry. Topics covered include signature based detection, generic signatures, passive heuristics, and active heuristics or emulation. A very basic compression algorithm is developed and taught so as to enhance...

    Provided By Eset

  • White Papers // Apr 2009

    The Root of All Evil? - Rootkits Revealed

    Public awareness of rootkits has risen in recent years, but as with worms, viruses and other forms of malicious software (malware), the term rootkit is applied unselectively to a range of technologies and has attracted a number of not-very-compatible definitions. While several of these technologies and definitions are explored in...

    Provided By Eset

  • White Papers // Feb 2009

    ESET Smart Security 4 Product White Paper: Antivirus - Antispyware - Personal Firewall - Antispam

    The Internet is perhaps the greatest communication tool ever created. However, now that so many computers have an "Always-On" connection to the Internet, there is an unprecedented amount of malware designed to take advantage of this global and ever-expanding, public network. ESET Smart Security 4 is a thoroughly integrated anti-malware...

    Provided By Eset

  • White Papers // Apr 2009

    From Fun to Profit: The Evolution of Malware

    Digital threats have evolved from a bizarre hobby for computer geeks into a huge source of profit for organized cyber-crime. From a technical point of view, malware has diversified to enable pursuit of a wide variety of criminal objectives and has increased its capabilities for penetration into victim systems. Recognizing...

    Provided By Eset

  • White Papers // Apr 2009

    Testing Testing: Anti-Malware Evaluation for the Enterprise

    Anti-malware software remains an essential defensive component for most enterprises, understandably anxious to get the right balance of affordability and effectiveness. Unfortunately, journalists, consumer groups and security amateurs keep finding ever more creative and inappropriate ways to test detection focused software. This paper, attempts to address a number of core...

    Provided By Eset

  • White Papers // Jan 2009

    The Passing Storm: The Storm/Nuwar Botnet

    While security software can mitigate the direct impact of Nuwar and other bot-related malware on individual systems, the wider effects of botnet activity need additional countermeasures. DDoS attacks, for instance, may be somewhat mitigated by firewall, switch and router configuration. Local monitoring and blocking of SMTP traffic from systems other...

    Provided By Eset

  • White Papers // Nov 2008

    Global Threat Trends: November 2008

    Analysis of ESET's ThreatSense.Net, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 11.74% of the total, was scored by the INF/Autorun class of threat. It have been detecting very high volumes of malware using the Windows Autorun facility for well...

    Provided By Eset

  • White Papers // Apr 2009

    Net of the Living Dead: Bots, Botnets and Zombies

    Organized crime long ago discovered the Internet's profit potential, and has succeeded not only in recruiting the necessary expertise to exploit that potential, but in capturing and subverting a significant quantity of innocent Internet-attached systems and, in the process, acquiring the owners of those systems as unwitting Although they are...

    Provided By Eset

  • White Papers // Apr 2009

    People Patching: Is User Education of Any Use at All?

    In general, the anti-malware community splits dramatically into two camps when it comes to the evergreen debate about the effectiveness of user education and security awareness as a protective measure. One camp argues that "If education was of any use, it would have worked by now": the other says that...

    Provided By Eset

  • White Papers // Apr 2009

    The Spam-Ish Inquisition

    UCE is usually regarded as a subset of UBE, though it's a very considerable percentage of 'Spammy' email, and many simply use the term UCE interchangeably with 'Spam'. Bulk email such as newsletters and mailing lists don't usually count, since "Solicit" those communications by subscribing to the list. Unfortunately, there...

    Provided By Eset

  • White Papers // Feb 2009

    Free But Fake: Rogue Anti-Malware

    Most antivirus products are commercial and typically offer, as is the case with ESET solutions, free trial versions for a 30-day period. This limitation is the perfect excuse for criminals to recommend their "Free and magical" antivirus software which guarantees to solve problems that the user does not really have....

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset