Award-winning news, views, and insight from the ESET security community How To Exploit Protection for Microsoft Windows we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses. Software exploits are an attack technique used by attackers to silently install various malware – such as Trojans or backdoors – on a
Once in a while we get to spend time analyzing malicious code that is not as widespread, or not as well-obfuscated as other threats we've encountered in the past. In this post we introduce our detailed analysis of one such threat, analyzed in further depth in a whitepaper: Did you say Advanced Persistent Threats? We decided to spend some time on this analysis because one of the components refers t
Award-winning news, views, and insight from the ESET security community Malware Win32/KanKan - Chinese drama In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities - and discuss the evidence that Xunlei Networking Technologies is implicated. In
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く