Crypto-ransomware (or filecoders) has been on the rise since at least 2013. Since then, cyber criminals have collected millions of US dollars by extorting money from victims in return for unlocking…
Client records, accounting history, trade secrets, personal information: what would happen to your business if hackers stole this data or held it for ransom?
In this document we summarize the ways in which ESET uses multi-layered technologies to go far beyond the capabilities of basic antivirus. We do this by explaining which layers are involved in solving…
As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come. Microsoft has promised greater security in Windows. During the past 12…
Ransomware is malware that can lock a device or encrypt its contents in order to extort money from the owner in return for restoring access to those resources. This kind of malware can also have a…
In our previous report "Windows exploitation in 2014", we mentioned a major trend in modern cyberattacks called 0day (or 0-day, or zero-day) attacks. This term refers to attacks that take advantage of…