
ESET Smart Security 8
Well-known IT security company ESET recently announced major updates to its flagship products – NOD 32 Antivirus and ESET Smart Security. The most typical modern …
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
One year ago, Android Defender, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered. Last month we saw …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
ESET releases Mac security products
ESET launched new products for the OS X platform: ESET Cyber Security Pro and ESET Cyber Security. According to a recent Macworld magazine poll, only half of Mac users employ …
ESET NOD32 Antivirus 6 and ESET Smart Security 6 released
ESET released new versions of its flagship products. Enhancements to both products include advancements in threat detection, more thorough cleaning of infected systems, and an …
Georbot information stealing Trojan uncovered
ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …
Tsunami, a new backdoor for Mac OS X
Malware authors have taken an old piece of malware developed for Linux and have modified it to attack the Mac OS X platform, warns ESET. The OS X malware has been named …
ESET NOD32 Antivirus for Linux 4 released
ESET announced the availability of ESET NOD32 Antivirus 4 Business Edition for Linux Desktop and ESET NOD32 Antivirus 4 for Linux. ESET NOD32 Antivirus 4 for Linux offers …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility