ºÝºÝߣshows by User: ESET_Global / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ESET_Global / Fri, 24 Aug 2018 09:00:02 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ESET_Global ESET Cybersecurity students /ESET_Global/eset-cybersecurity-students cybersecuritystudent-180824090003
Instructions for ESET Cybersecurity Training]]>

Instructions for ESET Cybersecurity Training]]>
Fri, 24 Aug 2018 09:00:02 GMT /ESET_Global/eset-cybersecurity-students ESET_Global@slideshare.net(ESET_Global) ESET Cybersecurity students ESET_Global Instructions for ESET Cybersecurity Training <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritystudent-180824090003-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Instructions for ESET Cybersecurity Training
ESET Cybersecurity students from ESET
]]>
4510 7 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritystudent-180824090003-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ESET Cybersecurity training /slideshow/eset-cybersecurity-training-111294993/111294993 cybersecurityadmin-180824085843
Instructions for administrators]]>

Instructions for administrators]]>
Fri, 24 Aug 2018 08:58:43 GMT /slideshow/eset-cybersecurity-training-111294993/111294993 ESET_Global@slideshare.net(ESET_Global) ESET Cybersecurity training ESET_Global Instructions for administrators <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityadmin-180824085843-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Instructions for administrators
ESET Cybersecurity training from ESET
]]>
2414 3 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityadmin-180824085843-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to implement a robust information security management system? /slideshow/how-to-implement-a-robust-information-security-management-system/83485034 esetwlsinfographiccopy-171206122000
An Information Security Management System (ISMS) involves implementing and maintaining processes to efficiently manage the protection of information and, in doing so, ensuring its integrity, confidentiality and availability. You may implement guidelines set out in ISO 27001, COBIT, NIST or in any other similar framework or you may even create your own management system. What matters in order to make ISMS efficient is to consider all these factors of the cycle.]]>

An Information Security Management System (ISMS) involves implementing and maintaining processes to efficiently manage the protection of information and, in doing so, ensuring its integrity, confidentiality and availability. You may implement guidelines set out in ISO 27001, COBIT, NIST or in any other similar framework or you may even create your own management system. What matters in order to make ISMS efficient is to consider all these factors of the cycle.]]>
Wed, 06 Dec 2017 12:20:00 GMT /slideshow/how-to-implement-a-robust-information-security-management-system/83485034 ESET_Global@slideshare.net(ESET_Global) How to implement a robust information security management system? ESET_Global An Information Security Management System (ISMS) involves implementing and maintaining processes to efficiently manage the protection of information and, in doing so, ensuring its integrity, confidentiality and availability. You may implement guidelines set out in ISO 27001, COBIT, NIST or in any other similar framework or you may even create your own management system. What matters in order to make ISMS efficient is to consider all these factors of the cycle. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/esetwlsinfographiccopy-171206122000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An Information Security Management System (ISMS) involves implementing and maintaining processes to efficiently manage the protection of information and, in doing so, ensuring its integrity, confidentiality and availability. You may implement guidelines set out in ISO 27001, COBIT, NIST or in any other similar framework or you may even create your own management system. What matters in order to make ISMS efficient is to consider all these factors of the cycle.
How to implement a robust information security management system? from ESET
]]>
9878 3 https://cdn.slidesharecdn.com/ss_thumbnails/esetwlsinfographiccopy-171206122000-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in November 3 /slideshow/antimalwareday-the-eset-celebration-of-the-origins-of-computer-defense-in-november-3/81477915 amd2017infographicen1-171101191743
On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used to exploit any connected system, but he wondered how long it would take for the code to do so. He prepared a prototype that – after eight hours of hard work on a VAX 11/750 system running Unix – was ready to be shown at the weekly security seminar he attended. It was his lecturer, Leonard Adleman, who baptized that program as a computer virus. Read more about #AntimalwareDay on WeLiveSecurity.com: https://goo.gl/QCSnc5]]>

On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used to exploit any connected system, but he wondered how long it would take for the code to do so. He prepared a prototype that – after eight hours of hard work on a VAX 11/750 system running Unix – was ready to be shown at the weekly security seminar he attended. It was his lecturer, Leonard Adleman, who baptized that program as a computer virus. Read more about #AntimalwareDay on WeLiveSecurity.com: https://goo.gl/QCSnc5]]>
Wed, 01 Nov 2017 19:17:43 GMT /slideshow/antimalwareday-the-eset-celebration-of-the-origins-of-computer-defense-in-november-3/81477915 ESET_Global@slideshare.net(ESET_Global) #AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in November 3 ESET_Global On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used to exploit any connected system, but he wondered how long it would take for the code to do so. He prepared a prototype that – after eight hours of hard work on a VAX 11/750 system running Unix – was ready to be shown at the weekly security seminar he attended. It was his lecturer, Leonard Adleman, who baptized that program as a computer virus. Read more about #AntimalwareDay on WeLiveSecurity.com: https://goo.gl/QCSnc5 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/amd2017infographicen1-171101191743-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used to exploit any connected system, but he wondered how long it would take for the code to do so. He prepared a prototype that – after eight hours of hard work on a VAX 11/750 system running Unix – was ready to be shown at the weekly security seminar he attended. It was his lecturer, Leonard Adleman, who baptized that program as a computer virus. Read more about #AntimalwareDay on WeLiveSecurity.com: https://goo.gl/QCSnc5
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in November 3 from ESET
]]>
2650 4 https://cdn.slidesharecdn.com/ss_thumbnails/amd2017infographicen1-171101191743-thumbnail.jpg?width=120&height=120&fit=bounds infographic White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Visiting the Bear Den /slideshow/visiting-the-bear-den/63290930 visitingthebeardenrecon2016calvetcamposdupuy-160621122822
A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers Joan Calvet, Jessy Campos and Thomas Dupuy.]]>

A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers Joan Calvet, Jessy Campos and Thomas Dupuy.]]>
Tue, 21 Jun 2016 12:28:22 GMT /slideshow/visiting-the-bear-den/63290930 ESET_Global@slideshare.net(ESET_Global) Visiting the Bear Den ESET_Global A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers Joan Calvet, Jessy Campos and Thomas Dupuy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/visitingthebeardenrecon2016calvetcamposdupuy-160621122822-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers Joan Calvet, Jessy Campos and Thomas Dupuy.
Visiting the Bear Den from ESET
]]>
18303 9 https://cdn.slidesharecdn.com/ss_thumbnails/visitingthebeardenrecon2016calvetcamposdupuy-160621122822-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Itself Through Education /ESET_Global/avar-sydney-2014-lemming-aid-and-kool-aid-helping-the-community-to-help-itself-through-education harleybortnik-awareness-160317112745
Presentation by ESET experts David Harley and Sebastian Bortnik about the importance of security education. ]]>

Presentation by ESET experts David Harley and Sebastian Bortnik about the importance of security education. ]]>
Thu, 17 Mar 2016 11:27:45 GMT /ESET_Global/avar-sydney-2014-lemming-aid-and-kool-aid-helping-the-community-to-help-itself-through-education ESET_Global@slideshare.net(ESET_Global) AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Itself Through Education ESET_Global Presentation by ESET experts David Harley and Sebastian Bortnik about the importance of security education. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/harleybortnik-awareness-160317112745-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation by ESET experts David Harley and Sebastian Bortnik about the importance of security education.
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Itself Through Education from ESET
]]>
17009 7 https://cdn.slidesharecdn.com/ss_thumbnails/harleybortnik-awareness-160317112745-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ESET Quick Guide to the EU General Data Protection Regulation /slideshow/eset-quick-guide-to-the-eu-general-data-protection-regulation/58651268 quickguidetogdpr-160224102114
2016 sees the 1995 Data Protection Directive bought up to date with new, EU-wide Regulation.]]>

2016 sees the 1995 Data Protection Directive bought up to date with new, EU-wide Regulation.]]>
Wed, 24 Feb 2016 10:21:14 GMT /slideshow/eset-quick-guide-to-the-eu-general-data-protection-regulation/58651268 ESET_Global@slideshare.net(ESET_Global) ESET Quick Guide to the EU General Data Protection Regulation ESET_Global 2016 sees the 1995 Data Protection Directive bought up to date with new, EU-wide Regulation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/quickguidetogdpr-160224102114-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2016 sees the 1995 Data Protection Directive bought up to date with new, EU-wide Regulation.
ESET Quick Guide to the EU General Data Protection Regulation from ESET
]]>
1936 12 https://cdn.slidesharecdn.com/ss_thumbnails/quickguidetogdpr-160224102114-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bootkits: Past, Present & Future - Virus Bulletin /slideshow/bootkits-past-present-future-virus-bulletin/58312287 rodionovmatrosovvb2014-160216090454
Presentation from ESET researchers Eugene Rodionov and David Harley, featured by Alex Matrosov about the history and evolution of bootkits.]]>

Presentation from ESET researchers Eugene Rodionov and David Harley, featured by Alex Matrosov about the history and evolution of bootkits.]]>
Tue, 16 Feb 2016 09:04:54 GMT /slideshow/bootkits-past-present-future-virus-bulletin/58312287 ESET_Global@slideshare.net(ESET_Global) Bootkits: Past, Present & Future - Virus Bulletin ESET_Global Presentation from ESET researchers Eugene Rodionov and David Harley, featured by Alex Matrosov about the history and evolution of bootkits. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rodionovmatrosovvb2014-160216090454-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation from ESET researchers Eugene Rodionov and David Harley, featured by Alex Matrosov about the history and evolution of bootkits.
Bootkits: Past, Present & Future - Virus Bulletin from ESET
]]>
16394 10 https://cdn.slidesharecdn.com/ss_thumbnails/rodionovmatrosovvb2014-160216090454-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Operation Buhtrap - AVAR 2015 /slideshow/operation-buhtrap-avar-2015/58155537 boutinavar2015operationbuhtrap-160211154848
This presentation from ESET researchers Jean-Ian Boutin, Anton Cherepanov and Jan Matusik explains the background of Operation Buhtrap.]]>

This presentation from ESET researchers Jean-Ian Boutin, Anton Cherepanov and Jan Matusik explains the background of Operation Buhtrap.]]>
Thu, 11 Feb 2016 15:48:48 GMT /slideshow/operation-buhtrap-avar-2015/58155537 ESET_Global@slideshare.net(ESET_Global) Operation Buhtrap - AVAR 2015 ESET_Global This presentation from ESET researchers Jean-Ian Boutin, Anton Cherepanov and Jan Matusik explains the background of Operation Buhtrap. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/boutinavar2015operationbuhtrap-160211154848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation from ESET researchers Jean-Ian Boutin, Anton Cherepanov and Jan Matusik explains the background of Operation Buhtrap.
Operation Buhtrap - AVAR 2015 from ESET
]]>
16658 8 https://cdn.slidesharecdn.com/ss_thumbnails/boutinavar2015operationbuhtrap-160211154848-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced Persistent Threats /slideshow/advanced-persistent-threats-57912851/57912851 20150925ag-aptspeakersnotes-soec-final-160205085322
ESET researcher Aryeh Goretsky explains in this presentation why he hates the term Advanced Persitent Threats (APT), what are the common mechanisms of APT and what are the defensive technologies.]]>

ESET researcher Aryeh Goretsky explains in this presentation why he hates the term Advanced Persitent Threats (APT), what are the common mechanisms of APT and what are the defensive technologies.]]>
Fri, 05 Feb 2016 08:53:22 GMT /slideshow/advanced-persistent-threats-57912851/57912851 ESET_Global@slideshare.net(ESET_Global) Advanced Persistent Threats ESET_Global ESET researcher Aryeh Goretsky explains in this presentation why he hates the term Advanced Persitent Threats (APT), what are the common mechanisms of APT and what are the defensive technologies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20150925ag-aptspeakersnotes-soec-final-160205085322-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ESET researcher Aryeh Goretsky explains in this presentation why he hates the term Advanced Persitent Threats (APT), what are the common mechanisms of APT and what are the defensive technologies.
Advanced Persistent Threats from ESET
]]>
2309 8 https://cdn.slidesharecdn.com/ss_thumbnails/20150925ag-aptspeakersnotes-soec-final-160205085322-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Shopping Online /slideshow/shopping-online-55499882/55499882 v9infographicshoppingglobal-151125102204-lva1-app6892
An ultimate comparison of online shopping in US, UK, Russia and Germany.]]>

An ultimate comparison of online shopping in US, UK, Russia and Germany.]]>
Wed, 25 Nov 2015 10:22:03 GMT /slideshow/shopping-online-55499882/55499882 ESET_Global@slideshare.net(ESET_Global) Shopping Online ESET_Global An ultimate comparison of online shopping in US, UK, Russia and Germany. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v9infographicshoppingglobal-151125102204-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An ultimate comparison of online shopping in US, UK, Russia and Germany.
Shopping Online from ESET
]]>
4448 6 https://cdn.slidesharecdn.com/ss_thumbnails/v9infographicshoppingglobal-151125102204-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Banking Online /slideshow/banking-online/55499811 v9infographicbankingglobal-151125102029-lva1-app6892
An ultimate comparison of online banking in US, UK, Russia and Germany. ]]>

An ultimate comparison of online banking in US, UK, Russia and Germany. ]]>
Wed, 25 Nov 2015 10:20:29 GMT /slideshow/banking-online/55499811 ESET_Global@slideshare.net(ESET_Global) Banking Online ESET_Global An ultimate comparison of online banking in US, UK, Russia and Germany. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/v9infographicbankingglobal-151125102029-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An ultimate comparison of online banking in US, UK, Russia and Germany.
Banking Online from ESET
]]>
2764 5 https://cdn.slidesharecdn.com/ss_thumbnails/v9infographicbankingglobal-151125102029-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Is Anti-Virus Dead? /slideshow/is-antivirus-dead/54250435 20151021ag-isavdead-final-151022081232-lva1-app6891
Let us explain you why we don't think so, in this comprehensive presentation from ESET researcher Aryeh Goretsky. #ESETCast]]>

Let us explain you why we don't think so, in this comprehensive presentation from ESET researcher Aryeh Goretsky. #ESETCast]]>
Thu, 22 Oct 2015 08:12:32 GMT /slideshow/is-antivirus-dead/54250435 ESET_Global@slideshare.net(ESET_Global) Is Anti-Virus Dead? ESET_Global Let us explain you why we don't think so, in this comprehensive presentation from ESET researcher Aryeh Goretsky. #ESETCast <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20151021ag-isavdead-final-151022081232-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let us explain you why we don&#39;t think so, in this comprehensive presentation from ESET researcher Aryeh Goretsky. #ESETCast
Is Anti-Virus Dead? from ESET
]]>
886 8 https://cdn.slidesharecdn.com/ss_thumbnails/20151021ag-isavdead-final-151022081232-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Is Linux/Moose endangered or extinct? /slideshow/is-linuxmoose-endangered-or-extinct/53456053 olivierbilodeau-linux-151002093843-lva1-app6891
Presentation of ESET researcher Olivier Bilodeau from Virus Bulletin Conference 2015. Embedded Linux platforms have been increasingly targeted by malware authors over the past few years. The targeted devices, labelled under the umbrella term 'Internet of Things', are generally consumer routers, gateways or modems. They are compromised remotely via brute-forcing of their credentials or being victim of an unpatched vulnerability, such as the infamous Shellshock. Most of these compromises result in the targeted system being assimilated into a botnet. Read more about Linux/Moose here: http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/]]>

Presentation of ESET researcher Olivier Bilodeau from Virus Bulletin Conference 2015. Embedded Linux platforms have been increasingly targeted by malware authors over the past few years. The targeted devices, labelled under the umbrella term 'Internet of Things', are generally consumer routers, gateways or modems. They are compromised remotely via brute-forcing of their credentials or being victim of an unpatched vulnerability, such as the infamous Shellshock. Most of these compromises result in the targeted system being assimilated into a botnet. Read more about Linux/Moose here: http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/]]>
Fri, 02 Oct 2015 09:38:43 GMT /slideshow/is-linuxmoose-endangered-or-extinct/53456053 ESET_Global@slideshare.net(ESET_Global) Is Linux/Moose endangered or extinct? ESET_Global Presentation of ESET researcher Olivier Bilodeau from Virus Bulletin Conference 2015. Embedded Linux platforms have been increasingly targeted by malware authors over the past few years. The targeted devices, labelled under the umbrella term 'Internet of Things', are generally consumer routers, gateways or modems. They are compromised remotely via brute-forcing of their credentials or being victim of an unpatched vulnerability, such as the infamous Shellshock. Most of these compromises result in the targeted system being assimilated into a botnet. Read more about Linux/Moose here: http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/olivierbilodeau-linux-151002093843-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation of ESET researcher Olivier Bilodeau from Virus Bulletin Conference 2015. Embedded Linux platforms have been increasingly targeted by malware authors over the past few years. The targeted devices, labelled under the umbrella term &#39;Internet of Things&#39;, are generally consumer routers, gateways or modems. They are compromised remotely via brute-forcing of their credentials or being victim of an unpatched vulnerability, such as the infamous Shellshock. Most of these compromises result in the targeted system being assimilated into a botnet. Read more about Linux/Moose here: http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/
Is Linux/Moose endangered or extinct? from ESET
]]>
16880 11 https://cdn.slidesharecdn.com/ss_thumbnails/olivierbilodeau-linux-151002093843-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Unpack your troubles*: .NET packer tricks and countermeasures /slideshow/unpack-your-troubles-net-packer-tricks-and-countermeasures-sponsor-presentation/53358951 eset-150930070931-lva1-app6891
Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too. *https://en.wikipedia.org/wiki/Pack_Up_Your_Troubles_in_Your_Old_Kit-Bag]]>

Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too. *https://en.wikipedia.org/wiki/Pack_Up_Your_Troubles_in_Your_Old_Kit-Bag]]>
Wed, 30 Sep 2015 07:09:30 GMT /slideshow/unpack-your-troubles-net-packer-tricks-and-countermeasures-sponsor-presentation/53358951 ESET_Global@slideshare.net(ESET_Global) Unpack your troubles*: .NET packer tricks and countermeasures ESET_Global Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too. *https://en.wikipedia.org/wiki/Pack_Up_Your_Troubles_in_Your_Old_Kit-Bag <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eset-150930070931-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too. *https://en.wikipedia.org/wiki/Pack_Up_Your_Troubles_in_Your_Old_Kit-Bag
Unpack your troubles*: .NET packer tricks and countermeasures from ESET
]]>
16737 7 https://cdn.slidesharecdn.com/ss_thumbnails/eset-150930070931-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ESET: #DoMore With Our Comprehensive Range of Business Products /slideshow/eset-domore-with-our-comprehensive-range-of-business-products/45132137 04productsmain-150225103943-conversion-gate01
Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>

Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>
Wed, 25 Feb 2015 10:39:43 GMT /slideshow/eset-domore-with-our-comprehensive-range-of-business-products/45132137 ESET_Global@slideshare.net(ESET_Global) ESET: #DoMore With Our Comprehensive Range of Business Products ESET_Global Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/04productsmain-150225103943-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide
ESET: #DoMore With Our Comprehensive Range of Business Products from ESET
]]>
2673 5 https://cdn.slidesharecdn.com/ss_thumbnails/04productsmain-150225103943-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ESET: Delivering Benefits to Enterprises /slideshow/eset-delivering-benefits-to-enterprises/45131973 03enterprises-150225103632-conversion-gate02
Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>

Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>
Wed, 25 Feb 2015 10:36:32 GMT /slideshow/eset-delivering-benefits-to-enterprises/45131973 ESET_Global@slideshare.net(ESET_Global) ESET: Delivering Benefits to Enterprises ESET_Global Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/03enterprises-150225103632-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide
ESET: Delivering Benefits to Enterprises from ESET
]]>
980 2 https://cdn.slidesharecdn.com/ss_thumbnails/03enterprises-150225103632-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ESET: Delivering Benefits to Medium and Large Businesses /slideshow/eset-delivering-benefits-to-medium-and-large-businesses/45131712 02smbbenefits-150225103047-conversion-gate02
Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>

Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide]]>
Wed, 25 Feb 2015 10:30:47 GMT /slideshow/eset-delivering-benefits-to-medium-and-large-businesses/45131712 ESET_Global@slideshare.net(ESET_Global) ESET: Delivering Benefits to Medium and Large Businesses ESET_Global Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/02smbbenefits-150225103047-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Following months of in-depth worldwide business user research and thousands of man-hours spent on its development, we are proudly introducing the new, completely re-engineered and redesigned line of #ESET business security products, now available worldwide. Check out our multi-layered security solutions and #DoMore! http://www.eset.com/int/about/press/articles/products/article/esets-next-generation-business-security-products-now-available-worldwide
ESET: Delivering Benefits to Medium and Large Businesses from ESET
]]>
845 5 https://cdn.slidesharecdn.com/ss_thumbnails/02smbbenefits-150225103047-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
#DoMore with ESET /slideshow/01-history-awards/45131347 01historyawards-150225102337-conversion-gate02
ESET is the pioneer of IT security since 1987. #DoMore with our new line of business security products. http://www.eset.com/int/business/]]>

ESET is the pioneer of IT security since 1987. #DoMore with our new line of business security products. http://www.eset.com/int/business/]]>
Wed, 25 Feb 2015 10:23:37 GMT /slideshow/01-history-awards/45131347 ESET_Global@slideshare.net(ESET_Global) #DoMore with ESET ESET_Global ESET is the pioneer of IT security since 1987. #DoMore with our new line of business security products. http://www.eset.com/int/business/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/01historyawards-150225102337-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ESET is the pioneer of IT security since 1987. #DoMore with our new line of business security products. http://www.eset.com/int/business/
#DoMore with ESET from ESET
]]>
1005 2 https://cdn.slidesharecdn.com/ss_thumbnails/01historyawards-150225102337-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2014: Mid-Year Threat Review /ESET_Global/20140625-ag-midyear-threat-reviewfinal-for-pub 20140625ag-mid-yearthreatreview-finalforpub-140702075450-phpapp02
Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats.]]>

Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats.]]>
Wed, 02 Jul 2014 07:54:49 GMT /ESET_Global/20140625-ag-midyear-threat-reviewfinal-for-pub ESET_Global@slideshare.net(ESET_Global) 2014: Mid-Year Threat Review ESET_Global Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20140625ag-mid-yearthreatreview-finalforpub-140702075450-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats.
2014: Mid-Year Threat Review from ESET
]]>
2158 5 https://cdn.slidesharecdn.com/ss_thumbnails/20140625ag-mid-yearthreatreview-finalforpub-140702075450-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ESET_Global-48x48.jpg?cb=1535375344 Do More with ESET Endpoint Security, delivering comprehensive IT security for your business via multiple layers of protection – including our field-proven ESET NOD32® detection technology, complete data access protection and fully adjustable scanning and update options. Keep your system running at its best thanks to low system demands, virtualization support and optional cloud-powered scanning. And oversee it all effortlessly with our completely redesigned, user-friendly ESET Remote Administrator web-console. www.eset.com/int/business/ https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritystudent-180824090003-thumbnail.jpg?width=320&height=320&fit=bounds ESET_Global/eset-cybersecurity-students ESET Cybersecurity stu... https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityadmin-180824085843-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/eset-cybersecurity-training-111294993/111294993 ESET Cybersecurity tra... https://cdn.slidesharecdn.com/ss_thumbnails/esetwlsinfographiccopy-171206122000-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-implement-a-robust-information-security-management-system/83485034 How to implement a rob...