Earlier this year I was forced to buy a new router for my home. As it is, with so many devices to connect, the old TP Link no longer provided me with what I needed. Two computers, three cell phones, video game console, TV, Chromecast, stereo, smart lights, thermostat, smartwatch… There are 13 computers permanently … More How to secure your router to prevent IoT threats?
Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play disguised as legitimate Poloniex mobile apps. Apart from harvesting Poloniex login credentials, the fake apps also try to trick victims into making their Gmail accounts accessible to the attackers. Poloniex is one of the world’s leading cryptocurrency … More Fake cryptocurrency trading apps on Google Play
During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their application trojanized with the OSX/Proton malware on their official website. ESET contacted Eltima as soon as the situation was confirmed. Eltima was very responsive and maintained an excellent communication with us throughout the incident. Timeline … More OSX/Proton spreading again through supply-chain attack
ESET is extremely proud to announce that it is the Bronze Award Winner of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms (EPP). Awards for top customer-rated companies The Gartner Peer Insights Customer Choice Awards are well recognised across the industry and aim to identify the companies that customers like the … More ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types of dangerous malware that run inconspicuously might get less of our attention; as is the case with firmware malware or bootkits. Bootkits run before the OS … More Malware in firmware: how to exploit a false sense of security
While we are supposedly in the era of the paperless office, intentional leaks via printed documents remain very common and can be just as damaging as their digital counterparts. While most of us realize the necessity of paper, do we recognize the risks of unauthorized viewing or document removal from the worksite? Data loss – … More Securing printed data in the ‘paperless’ office