Internet Security for Windows®
ENJOY YOUR TIME ONLINE
Our latest Internet security looking after your security. Connect securely on social networks, browse the internet or just play.
- Antivirus
- Antispyware
- Anti-Theft
- Anti-Phishing
- Personal Firewall
- Antispam
- Parental Control
- Social Media Scanner
- Exploit Blocker
- Advanced Memory Scanner
- Vulnerability Shield
- Device Control
A GREAT TIME ONLINE
WITH EVEN BETTER TECHNOLOGY!
Safer online begins with our proven Antivirus and Antispyware. Inside you find a number of uniqueanti-malware technologies.
Foiling web browser attacks is a job for Exploit Blocker. Vulnerability Shield closes common weaknesses in the network.
YOUR LAPTOP'S FRIEND IN NEED – ANTI-THEFT
In case you lose your device, don't lose your head. There's hope. Through our Anti-Theft online interface start searching for it.
Track its position, view webcam snapshots and send a message to the finder. All this to give you the clues so you can re-unite.
ESET Anti-Theft
Locates and retrieves your missing device
Should you part with your device, ESET Anti-Theft helps to track and locate it. See its position on the map, monitor foreign activity, and increase the chance of getting it back.
or
How does it work?
First, add all your devices you want to protect to Anti-Theft. If it so happens that your device gets lost or stolen, mark it as missing.
Monitor foreign activity
If you mark your device as missing, automatic monitoring is activated, allowing you to view webcam photos and screen captures. All the while, your user accounts stay protected.
Tracks device location
Aided by the networks in range, ESET Anti-Theft locates your device's position on the map to help you retrieve it.
Send a message to the finder
Want to get in touch with the finder? Send a one-way message that appears on the screen of your device. You can even add a webcam photo of the finder(s) if you managed to snap one.
YOUR SOCIAL NETWORKING MADE
SAFER ON FACEBOOK AND TWITTER
Stay protected while using social media. Decide which information is visible to public, and make changes to your profile you see fit.
On Facebook, protect you and your friend's timeline messages and newsfeed against malware.
On Twitter, protect your profile and posts, as well as those you follow against malicious links.
ENJOY EVEN MORE FEATURES
Identity Theft Protection
Steer clear of websites stealing usernames or banking details - with Anti-Phishing. Put a stop to private data copying to external devices - with Device Control.
Enjoy Your Computer's Full Power
Small System Footprint lets you stay connected without slowdowns. Do away with distractions with Gamer Mode as you run programs in full screen.
Keep Kids Safe Online
Show them only the safe side of the Internet. With Parental Control, block over 20 website categories or add your own.
Install and Forget or Tweak Away
Enjoy top protection with default settings. Set maximum scanning depth, time and size of scanned objects - with Advanced User Settings.
ESET LATEST TECHNOLOGY WORKING FOR YOU
ESET Technology
Exploit Blocker
Exploit Blocker is designed to fortify application types on users’ systems that are often exploited, such as web browsers, PDF readers, email clients or MS Office components. It adds another layer of protection one step closer to attackers by using a technology that is completely different to techniques that focus on detection of malicious files themselves.
Instead, it monitors the behavior of processes and looks out for suspicious activitiesthat are typical for exploits. When triggered, the behavior of the process is analyzed and, if considered suspicious, the threat may be blocked immediately on the machine, with further metadata about the attack being sent to our LiveGrid® cloud system. This information is further processed and correlated, which enables us to spot previously unknown threats, so called zero-day attacks, and provides our lab with valuable threat intelligence.
Related products - Exploit Blocker Technology is used in:
Java Exploit Blocker
Java Exploit Blocker uncovers attempts to take advantage of weaknesses in Java.It keeps a constant lookout over processes for any signs of suspicious activity or behavior. Threats are blocked and the fingerprint is sent to ESET LiveGrid® cloud system to ward off future attacks.
Related products - Exploit Blocker and Java Exploit Blocker Technologies are used in:
Botnet Protection
Botnet protection provides another, network-based layer of detection to reveal possible running threats.
It searches outgoing network communications for known malicious patterns, and matches the remote site against a blacklist of malicious ones. Any detected malicious communication is blocked and reported to the user.
Related products - Botnet Protection is used in:
Advanced Memory Scanner
Advanced Memory Scanner couples nicely with Exploit Blocker, as it is also designed to strengthen protection against modern malware. In an effort to evade detection, malware writers extensively use file obfuscation and/or encryption. This causes problems with unpacking and can pose a challenge for common anti-malware techniques, such as emulation or heuristics. To tackle this problem, the Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in the memory. This allows for effective detection of even heavily obfuscated malware. Unlike Exploit Blocker, this is a post-execution method, which means that there is a risk that some malicious activity could have been performed already. However, it steps into the protection chain as a last resort when everything else fails.
Related products - Advanced Memory Scanner Technology is used in:
Vulnerability Shield
Vulnerability shield is an extension of firewall and improves detection of known vulnerabilities on the network level.
By implementing detection for common vulnerabilities in widely used protocols, such as SMB, RPC and RDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitation of vulnerabilities for which a patch has not yet been released or deployed.
Related products: Vulnerability Shield is used inESET LiveGrid®
Built on our ThreatSense.NET® advanced early warning system, ESET LiveGrid® utilizes data that ESET users have submitted worldwide and sends it to ESET's Malware Research Lab.
By providing suspicious samples and metadata from the wild, ESET LiveGrid® is a vital feedback system that enables us to react immediately to the needs of our customers and adaptto the latest threats. ESET malware researchers use the information to build an accurate snapshot of the nature and scope of global threats, which helps us focus on the right targets. ESET LiveGrid® data plays an important role in setting priorities in our automated processing.
Moreover, it implements a reputation system that helps to improve the overall efficiency of our anti-malware solutions. When an executable file or archive is being inspected on a user’s system, its hashtag is first compared against a database of white- and blacklisted items.
If it is found on the whitelist, the inspected file is considered clean and also flagged to be excluded from future scans. If it is on the blacklist, appropriate actions are taken – based on the nature of the threat. Only if no match is found is the file scanned thoroughly. Based on the results of this scan the file becomes a candidate for addition to one of the two lists. This approach has a significant positive impact on scanning performance.
This reputation system allows for effective detection of malware even before signatures are delivered to users’ computers via our virus signature database update (which happens several times a day).
Related products: ESET LiveGrid® Technology is used in all ESET antivirus products:
Anti-Phishing
Anti-Phishing technology protects you from attempts to acquire passwords, banking data and other sensitive information by fake websites, masquerading as legitimate ones.
When a user’s computer attempts to access a URL, ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL is aborted and a warning message is displayed. At this point, the user has the option to proceed to the URL at his/her own risk or report the URL to us as a potential false positive warning.
The Anti-phishing database is updated by ESET regularly (users’ computers receive data about new phishing threats every 20 minutes).
Along with this straightforward approach, ESET Anti-Phishing implements specific proactive algorithms. These inspect the visual design of websites in an effort to eliminate those mimicking their genuine counterparts. This approach is used to detect, for example, fake internet banking forms.
Related products - Anti-Phishing Technology is used in:
Malware sample processing
ESET’s Security Research Lab receives many infected samples from various sources every day.Sample submissions from customers, distributors and partners (sent to samples@eset.com) are an important source of new malware.
Other sources include sample exchange or active honey pots, for example. After being pre-processed by automated algorithms, the received samples are reviewed by a team of detection engineers and malware analysts. Their job is to decide whether the submitted file or URL is malicious, and if it is, to create a suitable detection signature or algorithm for it.
There are several types of detection signatures and the detection engineer has to choose the most effective one depending on the characteristics of the malware. Newly created signatures are then packed together and released to our users in the form of a Virus Signature Database Update.These updates are rolled out several times a day, 24-7-365.
Related products: ESET LiveGrid® Technology is used in all ESET products:
Signature types
ESET’s scanning engine uses several types of detection signatures for detecting malicious objects (files, processes, URLs, etc.).
The signature types range from very specific hashes (useful, for example, in targeting specific malicious binaries, specific versions of malware, for statistical purposes, or simply for giving a more precise detection name to a malware that we have been detecting heuristically) to DNA-based Smart Signatures, which are rather complex definitions of malicious behavior and malware characteristics. These signatures also rely on heuristics and emulation to evaluate the scanned sample.
The strength of ESET’s proactive detection lies in the Smart DNA signatures. They mean that the detection is effective, as well as efficient – a single well-crafted signature can detect thousands of related malware variants and enables our antivirus software not only to detect malware that we already know of, or have seen before, but also new, previously unknown variants.
Related products: ESET LiveGrid® Technology is used in all ESET products:
Cleaning
When a computer is infected with malware, it will usually suffice to delete the detected file(s) in order to clean the infected system. But in certain cases – for example when the malware has modified operating system files, tampered with the system Registry or when a parasitic virus has infected the user’s own files – the situation gets more complicated. Simply deleting the infected file could cause data loss or even render the computer unbootable.
Therefore, a different approach – cleaning or disinfection of the infected files – has to be taken. In most such cases the cleaning is performed directly by the installed antivirus. Exceptionally, however, the disinfection steps are too complex or simply too dangerous (system stability-wise) and we may opt to release standalone cleaners for this purpose. These are available free of charge, also for non-customers.
Related products: ESET LiveGrid® Technology is used in all ESET products:
Advanced Heuristics
Advanced Heuristics is one of the technologies used for proactive detection. It provides the ability to detect unknown malware based on its functionality through emulation. The latest version introduces a completely new way of code emulation based on binary translation.
This new binary translator helps to bypass anti-emulation tricks used by malware writers. Along these improvements, DNA-based scanning has also been extended significantly. This allows for better detections which address current malware more accurately.
Related products: ESET LiveGrid® Technology is used in all ESET antivirus products:
Pass for zip?
ReplyDeletekalamfaim.blogspot.com
DeleteThis comment has been removed by a blog administrator.
ReplyDelete