12 months on, what are the lessons learned from WannaCryptor?

Time does fly! It feels like only yesterday that a new strain of hitherto little-known malware achieved celebrity status among global ransomware campaigns. It’s already been a year, almost to the day, since the WannaCryptor ransomware cryptoworm – also known as WannaCry and detected by ESET as Win32/Filecoder.WannaCryptor.D – ran rampant. What made WannaCryptor’s impact so severe, … More 12 months on, what are the lessons learned from WannaCryptor?

Five tips for keeping your database secure

When we give privacy or security advice, we usually talk about strong passwords, backing up your data, using security applications, keeping systems up to date, and avoiding default settings. In general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are … More Five tips for keeping your database secure

Bad Rabbit: Not-Petya is back with improved ransomware

A new ransomware outbreak today and has hit some major infrastructure in Ukraine including Kiev metro. Here are some of the details about this new variant. Drive-by download via watering hole on popular sites One of the distribution method of Bad Rabbit is via drive-by download. Some popular websites are compromised and have JavaScript injected in … More Bad Rabbit: Not-Petya is back with improved ransomware

DoubleLocker Android ransomware explained

Cybercriminals have developed an innovative ransomware that is based on the foundations of a particular banking Trojan to misuse Android accessibility services. Discovered by ESET malware researcher, Lukáš Štefanko, DoubleLocker, has two powerful tools for extorting money from its victims, and includes a combination that has not been seen previously in the Android ecosystem. WeLiveSecurity sat down … More DoubleLocker Android ransomware explained

DoubleLocker: Innovative Android Ransomware

ESET researchers have spotted the first-ever ransomware misusing Android accessibility services. On top of encrypting data, it also locks the device. Detected by ESET products as Android/DoubleLocker.A, the ransomware is based on the foundations of a particular banking Trojan, known for misusing accessibility services of the Android operating system. However, DoubleLocker doesn’t have the functions related … More DoubleLocker: Innovative Android Ransomware

Say Hello to ESET Endpoint Encryption

ESET  introduces its rebranded product ESET Endpoint Encryption to audiences at the 2017 Gartner Security & Risk Management Summit in London. Following a two-year transition following the acquisition of recognized data encryption company DESlock Ltd., ESET is boosting its brand building activities by fully adding the renowned solution under the parent brand. ESET Endpoint Encryption is a … More Say Hello to ESET Endpoint Encryption

Buying encryption? Five good questions to ask before you do

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption. However, with limited time and the market flooded by various products, it can be a difficult task for companies’ owners and decision-makers to find the right fit … More Buying encryption? Five good questions to ask before you do