San Diego, CA , December, 2012

Global Threat Report, December 2012

ThreatBlogger FootSloggers Review 2012. ESET Papers and Articles in 2012.  

Download full report.

San Diego, CA , November, 2012

Global Threat Report, November 2012

Deck the Halls with Hoaxes and Holly. Safer cyber-shopping makes for happier holidays: 12 simple safety tips. Windows 8: there’s more to security than the Operating System.  

Download full report.

San Diego, CA , October, 2012

Global Threat Report, October 2012

Ever received a “Londoning” scam? Quantum of Soullessness. It’s not all about support scams. In God we trust. All others pay cash by credit card.   

Download full report.

San Diego, CA , September, 2012

Global Threat Report, September 2012

Irish Ransomware Is No Joke. Defeating anti-forensics in contemporary complex threats. BYOD:(B)rought (Y)our (O)wn (D)estruction? Dorkbot: hunting zombies in Latin America. Malware and Mrs Malaprop: what do consumers really know about AV? (sponsor presentation). LAST-MINUTE PAPER: Gataka: a banking trojan ready to take off? LAST-MINUTE PAPER: ACAD/Medre: industrial espionage in Latin America? My PC has 32,539 errors: how telephone support scams really work. Cyberwar: reality, or a weapon of mass distraction?  

Download full report.

San Diego, CA , August, 2012

Global Threat Report, August 2012

An Offer You Can’t Refuse. The Industrialization of Criminal Malware. Threatsense 2012 – the sequel. Mobile Mugging: Phoning in the Attack.  

Download full report.

San Diego, CA , July, 2012

Global Threat Report, July 2012

Phishing Phrenzy. ACAD/Medre.A used for scareware. An updated version of an old scam. Passwords exposed: unfortunately Yahoo! is not alone. Some highlights from the Cybercrime Corner.  

Download full report.

San Diego, CA , June, 2012

Global Threat Report, June 2012

ACAD/Medre: 10ks of AutoCAD Designs Leaked in Suspected Industrial Espionage.

Download full report.

San Diego, CA , May, 2012

Global Threat Report, May 2012

Antivirus, Antimalware, Flame and the RAT Factor. Additions to the ESET Resources Pages. The Top Ten Threats. Top Ten Threats at a Glance (graph).  

Download full report.

San Diego, CA , April, 2012

Global Threat Report, April 2012

Now Google Privacy Policy Reaches the Cloud. How to recognize a PC support scam. Pirated software: an update from Ireland. The Top Ten Threats. Top Ten Threats at a Glance (graph). Annexe.  

Download full report.

San Diego, CA , March, 2012

Global Threat Report, March 2012

Sizing Up the BYOD Security Challenge. Java Holes and Targeted Attacks. Gender and the Success of Suspicious Links. AMTSO, Testing, and ESET’s Dutch Treat. The Top Ten Threats. Top Ten Threats at a Glance (graph).

Download full report.

Please enable Javascript to ensure correct displaying of this content and refresh this page.