False positives can be more costly than a malware infection

Poor business decisions can be very costly, especially in cybersecurity, where labeling clean items as malicious – so-called false positives – can have very damaging consequences. So, how can you simultaneously keep the error rates low, uphold detection rates and keep protection strong? With a combination of a well-tuned security solution and experienced human supervision. … More False positives can be more costly than a malware infection

8 things you should know about spyware

Spyware is defined as a “generic term for a range of surreptitious malware such as keyloggers, remote access trojans, and backdoor trojans, especially those that allow remote surveillance of passwords and other sensitive data”. The term can also refer to “more aggressive adware”, which collects user information such as visited websites, installed applications, and other personal … More 8 things you should know about spyware

Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?

As of February 13th, 2017, Gmail has started deploying their new restrictive policy on .js file attachments, extending their list of file types blocked for security reasons. After the full release, Gmail users won’t be able to send or receive mail containing .js attachments, even if they’re in a compressed and archived form. Seeing that … More Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?

New Android trojan mimics user clicks to download dangerous malware

Android users have been exposed to a new malicious app imitating Adobe Flash Player that serves as a potential entrance for many types of dangerous malware. The application, detected by ESET security software as Android/TrojanDownloader.Agent.JI, tricks its victims into granting it special permissions in the Android accessibility menu and uses these to download and execute … More New Android trojan mimics user clicks to download dangerous malware

The odd, 8-year legacy of the Conficker worm

Eight years ago, on November 21st, 2008, Conficker reared its ugly head. And since then, the “worm that roared” – as ESET’s distinguished researcher Aryeh Goretsky puts it – has remained stubbornly active. Targeting Microsoft Windows, it has compromised home, business and government computers across 190 countries, leading experts to call it the most notorious … More The odd, 8-year legacy of the Conficker worm