If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack. Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two ways. First, the term “coronavirus” is reaching unprecedented levels of search volumes, meaning that malicious … More 5 tips for a cybersecure home office experience
ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples. UEFI (Unified Extensible Firmware Interface) security has been a hot topic for the past few years, but, due to various limitations, very little UEFI-based malware has been found in the … More Needles in a haystack: Picking unwanted UEFI components out of millions of samples
ESET researchers discovered the first-ever known cyberattack conducted via a UEFI rootkit. We sat down with Jean-Ian Boutin, ESET Senior Malware Researcher who led the research and asked a few questions to shed more light on his team’s discovery and its consequences. In your white paper, you claim to have discovered the first-ever UEFI rootkit in the … More Q&A with an ESET Malware Researcher – Cyberattack via UEFI rootkit
Applies to: All ESET products The Spectre and Meltdown vulnerabilities, published on January 3, 2018, are byproducts of optimization techniques designed to increase the performance of modern processors. ESET products are some of the first to offer full compatibility with Microsoft emergency patches that help protect against these issues. Apple has also released mitigations for the macOS, … More ESET can help stop malware that in the future may use Spectre and Meltdown vulnerabilities
Earlier this year I was forced to buy a new router for my home. As it is, with so many devices to connect, the old TP Link no longer provided me with what I needed. Two computers, three cell phones, video game console, TV, Chromecast, stereo, smart lights, thermostat, smartwatch… There are 13 computers permanently … More How to secure your router to prevent IoT threats?
When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types of dangerous malware that run inconspicuously might get less of our attention; as is the case with firmware malware or bootkits. Bootkits run before the OS … More Malware in firmware: how to exploit a false sense of security