Thunderbolt flaws open millions of PCs to physical hacking

A new attack method enables bad actors to access data on a locked computer via an evil maid attack within 5 minutes. Millions of computers sporting Intel’s Thunderbolt ports are open to hands-on hacking attempts due to vulnerabilities in this hardware interface, according to research by Björn Ruytenberg, a security researcher at Eindhoven University of Technology … More Thunderbolt flaws open millions of PCs to physical hacking

5 tips for a cybersecure home office experience

If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack. Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two ways. First, the term “coronavirus” is reaching unprecedented levels of search volumes, meaning that malicious … More 5 tips for a cybersecure home office experience

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples. UEFI (Unified Extensible Firmware Interface) security has been a hot topic for the past few years, but, due to various limitations, very little UEFI-based malware has been found in the … More Needles in a haystack: Picking unwanted UEFI components out of millions of samples

Q&A with an ESET Malware Researcher – Cyberattack via UEFI rootkit

ESET researchers discovered the first-ever known cyberattack conducted via a UEFI rootkit. We sat down with Jean-Ian Boutin, ESET Senior Malware Researcher who led the research and asked a few questions to shed more light on his team’s discovery and its consequences. In your white paper, you claim to have discovered the first-ever UEFI rootkit in the … More Q&A with an ESET Malware Researcher – Cyberattack via UEFI rootkit

ESET can help stop malware that in the future may use Spectre and Meltdown vulnerabilities

Applies to: All ESET products The Spectre and Meltdown vulnerabilities, published on January 3, 2018, are byproducts of optimization techniques designed to increase the performance of modern processors. ESET products are some of the first to offer full compatibility with Microsoft emergency patches that help protect against these issues. Apple has also released mitigations for the macOS, … More ESET can help stop malware that in the future may use Spectre and Meltdown vulnerabilities