Eset

Displaying 1-8 of 8 results

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • White Papers // May 2009

    Cybersecurity Review: Background, Threatscape, Best-Practices and Resources

    The target of cybercrime centers on information - the data that is electronically stored for retrieval and subsequent use. To get an idea of the scale of the threat of cybercrime, it takes a look at the overall use of the Internet, theft or exposure of personal data through data...

    Provided By Eset

  • White Papers // Sep 2009

    The Game of the Name Malware Naming, Shape Shifters and Sympathetic Magic

    Once upon a time, one infection by specific malware looked much like another infection, to an antivirus scanner if not to the naked eye. Even back then, virus naming wasn't very consistent between vendors, but at least virus encyclopaedias and third-party resources like vgrep made it generally straightforward to map...

    Provided By Eset

  • White Papers // Sep 2009

    Staying Safe on the Internet

    The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing exposure to attacks from cybercriminals. Of course, it can't cover all bases in a short document for every kind of cybercrime, not to mention the more traditional crimes...

    Provided By Eset

  • White Papers // Aug 2009

    Social Security Numbers: Identification Is Not Authentication

    The sky is not falling. Knowing SSN is not necessarily enough to give an attacker control over finances or steal identity. It depends on the context and on what other information he or she has. As the Social Security Office has rightly, if a little evasively, pointed out, Acquistion and...

    Provided By Eset

  • White Papers // Aug 2009

    Keeping Secrets: Good Password Practice

    Passwords and passphrases are one example of a form of security measure called authentication. It gives them to people so that they can use them to prove that they are entitled to use something to which access is restricted: for example, a restricted area, a computer system, an Internet service...

    Provided By Eset

  • White Papers // Aug 2009

    Playing Dirty

    This paper highlights the importance of protecting the gamer. However, when malware targeting online games is copied to the system, it does not and cannot check whether the owner of the system is a gamer or not, so it will infect the system notwithstanding. Finally, it is important to mention...

    Provided By Eset

  • White Papers // Aug 2009

    Common Hoaxes and Chain Letters: Volume 1

    This is a listing of hoaxes and chain letters that are commonly reported right now, though it might be expanded to include more varied material, as time allows. Not all hoaxes are chain letters, of course. Come to that, not all chain letters are hoaxes, either, but it's rarely a...

    Provided By Eset

  • White Papers // May 2009

    Cybersecurity Review: Background, Threatscape, Best-Practices and Resources

    The target of cybercrime centers on information - the data that is electronically stored for retrieval and subsequent use. To get an idea of the scale of the threat of cybercrime, it takes a look at the overall use of the Internet, theft or exposure of personal data through data...

    Provided By Eset

  • White Papers // Nov 2010

    Test Files and Product Evaluation: The Case for and Against Malware Simulation

    Any researcher with the most modest public profile is used to being asked for virus samples. Traditionally, the authors have advocated the use of alternatives, especially the EICAR test file, to anyone who doesn't have access to malware through mainstream, trusted channels, as a way of simulating malware behavior without...

    Provided By Eset