ESET, a global pioneer in proactive protection for more than two decades, announces the latest release of its secure access solution ESET Secure Authentication. ESET’s mobile-based solution brings…
Last week’s patch of a Microsoft Internet Explorer vulnerability allowing remote code execution, which had lain undiscovered for almost 20 years, has prompted significant interest among…
G20 Summits are notorious in the IT security industry for frequently being the target of cyber-criminals. The 2014 G20 Summit, being held this weekend in Brisbane, Australia, is proving to be no…
ESET, a global pioneer in proactive protection for more than two decades, announces award-winning scores for its latest product release of ESET Smart Security in the latest AV-Comparatives Performance…
Focusing on detections of the Korplug trojan, ESET® researchers lately noticed two larger scale campaigns employing this well-known Remote Access Trojan. The first one, related to Afghanistan and…
ESET researchers in Montreal have uncovered another activity of the Sednit cyber-espionage group that allows them to attack physically isolated computers. A month after ESET researchers informed on…