San Diego, CA , December, 2012
Global Threat Report, December 2012
ThreatBlogger FootSloggers Review 2012. ESET Papers and Articles in 2012.
San Diego, CA , November, 2012
Global Threat Report, November 2012
Deck the Halls with Hoaxes and Holly. Safer cyber-shopping makes for happier holidays: 12 simple safety tips. Windows 8: there’s more to security than the Operating System.
San Diego, CA , October, 2012
Global Threat Report, October 2012
Ever received a “Londoning” scam? Quantum of Soullessness. It’s not all about support scams. In God we trust. All others pay cash by credit card.
San Diego, CA , September, 2012
Global Threat Report, September 2012
Irish Ransomware Is No Joke. Defeating anti-forensics in contemporary complex threats. BYOD:(B)rought (Y)our (O)wn (D)estruction? Dorkbot: hunting zombies in Latin America. Malware and Mrs Malaprop: what do consumers really know about AV? (sponsor presentation). LAST-MINUTE PAPER: Gataka: a banking trojan ready to take off? LAST-MINUTE PAPER: ACAD/Medre: industrial espionage in Latin America? My PC has 32,539 errors: how telephone support scams really work. Cyberwar: reality, or a weapon of mass distraction?
San Diego, CA , August, 2012
Global Threat Report, August 2012
An Offer You Can’t Refuse. The Industrialization of Criminal Malware. Threatsense 2012 – the sequel. Mobile Mugging: Phoning in the Attack.
San Diego, CA , July, 2012
Global Threat Report, July 2012
Phishing Phrenzy. ACAD/Medre.A used for scareware. An updated version of an old scam. Passwords exposed: unfortunately Yahoo! is not alone. Some highlights from the Cybercrime Corner.
San Diego, CA , June, 2012
Global Threat Report, June 2012
ACAD/Medre: 10ks of AutoCAD Designs Leaked in Suspected Industrial Espionage.
San Diego, CA , May, 2012
Global Threat Report, May 2012
Antivirus, Antimalware, Flame and the RAT Factor. Additions to the ESET Resources Pages. The Top Ten Threats. Top Ten Threats at a Glance (graph).
San Diego, CA , April, 2012
Global Threat Report, April 2012
Now Google Privacy Policy Reaches the Cloud. How to recognize a PC support scam. Pirated software: an update from Ireland. The Top Ten Threats. Top Ten Threats at a Glance (graph). Annexe.
San Diego, CA , March, 2012
Global Threat Report, March 2012
Sizing Up the BYOD Security Challenge. Java Holes and Targeted Attacks. Gender and the Success of Suspicious Links. AMTSO, Testing, and ESET’s Dutch Treat. The Top Ten Threats. Top Ten Threats at a Glance (graph).