The security review: Windows exploitation 2015 and Bayrob trojan

It’s that time of the week again when we recap the biggest, most interesting and notable security stories from the past seven days. And yes, we’ve got a brand new logo to show off as well. We thought it was about time. ESET published Windows exploitation 2015 ESET released its annual Windows exploitation report, which… More The security review: Windows exploitation 2015 and Bayrob trojan

Security holes found in Windows, Office, Internet Explorer, Adobe… Start patching now!

By now you should be settled back at work after the holiday break. Are you ready for 2016? I hope you’re sitting comfortably, because from the security point of view it’s bound to be a bumpy ride. Microsoft Yesterday was the second Tuesday of the month and you know what that means – Patch Tuesday… More Security holes found in Windows, Office, Internet Explorer, Adobe… Start patching now!

News from the Dorkside: Dorkbot botnet disrupted

ESET has collaborated with Microsoft, CERT.PL and various law enforcement bodies around the world to disrupt known Dorkbot botnets by sinkholing their C&C servers. ESET shared technical analysis, statistical information about the malware used, and known command and control servers’ domains and IPs. We also were able to leverage our historical knowledge of this threat… More News from the Dorkside: Dorkbot botnet disrupted

Windows 10, Privacy 0? ESET dives into the privacy of Microsoft’s new OS

Introduction The title of this article is “Windows 10, Privacy 0: ESET deeps dives into the privacy of Microsoft’s new OS” and in it I will be providing analysis of Microsoft’s privacy plans for Windows 10, some of the reasoning behind those changes, and also theorize about who else besides Microsoft might be interested. But… More Windows 10, Privacy 0? ESET dives into the privacy of Microsoft’s new OS

The world’s biggest bug bounty payouts

So-called ‘bug bounties’ are offered by some of the world’s largest websites and software companies to ensure that software bugs are found and fixed by friendly security researchers, rather than by malicious hackers who could use the same flaws to cause significant damage. Bug bounties are a relatively new phenomenon but, in recent years, have… More The world’s biggest bug bounty payouts

Before Moving to Windows 10, Make Sure You Have the Latest Version of ESET

Upgrading to a newer version of ESET products for home or business is free ESET home and business products for Windows are compatible with the newest version of Microsoft’s operating system. However, users who still have older versions of ESET security products are recommended to upgrade them to newer versions before moving to Windows 10.… More Before Moving to Windows 10, Make Sure You Have the Latest Version of ESET

Critical vulnerabilities in Windows and Adobe Reader exposed by hacker

A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management. Google Project Zero hacker Mateusz Jurczyk found a total of 15 vulnerabilities, any of which could trigger remote code execution or privilege escalation in Adobe Reader or the Windows kernel.… More Critical vulnerabilities in Windows and Adobe Reader exposed by hacker