Eset News

ESET Selected as Finalist for 2015 Best of Interop Award

ESET today announced its selection as a finalist for Interop Las Vegas’ 2015 Best of Interop Awards in the Security category. The Best of Interop Awards recognize exhibitors for innovation and technological advancements in nine technology categories. Award winners will be announced from Interop Las Vegas 2015, which takes place April 27-May 1 at the Mandalay Bay Convention Center.

ESET Researcher to Present “A Tale of Medical Fraud” at the HIMSS15 Cybersecurity Summit

ESET®, the global leader in proactive digital protection, announced today that Stephen Cobb, senior security researcher, will be presenting “Franky and Jamie: A tale of medical data fraud” on April 15 at the Cybersecurity Command Center at the Health Information Management Systems Society (HIMSS) 2015 Conference.

A-V Comparatives reviews ESET’s next-generation business products

ESET®, a global pioneer in proactive protection for more than two decades, announces the availability of two independent, in-depth security software reviews for the next-generation business products – ESET Endpoint Security and ESET Remote Administrator. The reviews were conducted by the globally recognized independent testing organization AV-Comparatives.

Survey of IT Managers Highlights Top Cybersecurity Technology Concerns

ESET®, a global pioneer in proactive protection for more than two decades, today announced the results of a user survey identifying top cybersecurity technology concerns of IT managers. Overwhelmingly, the results spoke to the many different competing priorities within an enterprise IT environment, and managers’ and administrators’ need for tools that streamline processes and save them time.

Syria Targeted by Cartoon Malware

The espionage group behind the infamous eavesdropping cartoon malware strikes again. After Bunny and Babar the Elephant, the cyber criminals have developed their latest piece of malware – Casper. This first-stage reconnaissance tool is able to send a detailed report about the victim’s infected machine to its controller.