Eset Antivirus 3 Years

0 views
Skip to first unread message

Giacometta Fritchman

unread,
Aug 3, 2024, 5:40:24 PM8/3/24
to tacurigle

There is good sale of Eset NOD32 Antivirus (3 user/license) 2017 at my local electronics store. If I were to buy 2 physical copies could I install the second copy after the first subscription runs out after a year? I realize I would be a version behind but I could live with that for the money savings. Would there be a problem installing/activating my second copy of the antivirus a year later? Thanks for everyone's time.

That should be no problem. Once the first one expires, just enter the new (2nd) key. The gui should prompt you to either buy a new one from ESET or ask you if you already have a key (if I recall correctly). Also just by having a valid license you are entitled to the latest version (of the program purchased) at no extra charge-just download it and use the enclosed activation key in one of the boxes. Of course, before you install ESET, you'll need to uninstall whatever A/V program you got.

I just did this same thing after buying a new copy at Fry's. Make sure you install your new license code on the day that your old code expires. I entered mine thinking it would expand the license another year from my expiration date. But it started the 1 year from the date I put in the new license key. I lost 8 days in doing so. So wait until Your current license is expiring.

I've been using ESS for years. So if you fall into that category, keep a spare license (or 3) around. Of course, the Company line is to buy from ESET, but by the same token, keep an eye open for sales like at Amazon, Newegg, Staples and the like. Especially around the holidays like Black Friday/Cyber Monday (ESET also runs deals from time to time).

It was still cheaper for me to buy at Fry's. I only wanted the antivirus product. Eset is $59.99 for 3 devices and 1 year. Fry's was $19.99. I didn't see any coupon on that Eset page for what I wanted. I'll take the 8 days lost at my savings of $40

The updates include the launch of the endpoint security company's first Partner Advisory Council, which will include around 10 partners. The partners chosen will represent the various business models that ESET works with in North America and different experience levels.

ESET also recently added more marketing materials and MDF, the latter of which will focus on helping partners hold events and other activities. ESET also has revamped its sales and technical certifications, with training online and in-person. Finally, ESET added a Cybersecurity Awareness Training program, which partners can offer to customers at no cost to educate employees on security best practices.

Cameron Tousley, partner community manager for ESET North America, said the updates come as ESET sees continued momentum around its channel business in the region. The company has seen a 40 percent increase in the number of active partners year over year, growing to around 4,500 active partners total, Tousley said.

ESET has focused on building out its channel strategy for the past 10 years, according to Tousley. That has mirrored an evolution of ESET from an antivirus company to a full endpoint security and security software company, Tousley said. ESET recognizes that it needs partners to help grow in those markets, he said.

Ted Clouser, executive vice president of Little Rock, Ark.-based managed security services provider PC Assistance, said the company has seen "steady" growth with ESET since signing on as a partner early last year. PC Assistance has made a "seamless" transition for most of its customer base and has been impressed by the technology.

Clouser said he is glad to see ESET continue to make investments in its channel partners. The investments in marketing tools and advertising are particularly important, he said, as they help PC Assistance leverage ESET's knowledge base and research with its own clients.

LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.

Imagine getting a call from your company's IT department telling you your workstation has been compromised and you should stop what you're doing immediately. You're stumped: You went through the company's security training and you're sure you didn't open any suspicious email attachments or click on any bad links; you know that your company has a solid patching policy and the software on your computer is up to date; you're also not the type of employee who visits non-work-related websites while on the job. So, how did this happen?

A few days later, an unexpected answer comes down from the security firm that your company hired to investigate the incident: Hackers got in by exploiting a flaw in the corporate antivirus program installed on your computer, the same program that's supposed to protect it from attacks. And all it took was for attackers to send you an email message that you didn't even open.

This scenario might sound far-fetched, but it's not. According to vulnerability researchers who have analyzed antivirus programs in the past, such attacks are quite likely, and may already have occurred. Some of them have tried to sound the alarm about the ease of finding and exploiting critical flaws in endpoint antivirus products for years.
Sample password protection policy

Since June, researchers have found and reported several dozen serious flaws in antivirus products from vendors such as Kaspersky Lab, ESET, Avast, AVG Technologies, Intel Security (formerly McAfee) and Malwarebytes. Many of those vulnerabilities would have allowed attackers to remotely execute malicious code on computers, to abuse the functionality of the antivirus products themselves, to gain higher privileges on compromised systems and even to defeat the anti-exploitation defenses of third-party applications.

Exploiting some of those vulnerabilities required no user interaction and could have allowed the creation of computer worms -- self-propagating malware programs. In many cases, attackers would have only needed to send specially crafted email messages to potential victims, to inject malicious code into legitimate websites visited by them, or to plug in USB drives with malformed files into their computers.

Evidence suggests that attacks against antivirus products, especially in corporate environments, are both possible and likely. Some researchers believe that such attacks have already occurred, even though antivirus vendors might not be aware of them because of the very small number of victims.

The intelligence agencies of various governments have long had an interest in antivirus flaws. News website The Intercept reported in June that the U.K. Government Communications Headquarters (GCHQ) filed requests in 2008 to renew a warrant that would have allowed the agency to reverse engineer antivirus products from Kaspersky Lab to find weaknesses. The U.S. National Security Agency also studied antivirus products to bypass their detection, according to secret files leaked by former NSA contractor Edward Snowden, the website said.
How Data is Disrupting Your Processes

Thirty-six years ago, in 1970, Alvin Toffler published Future Shock in which he popularized the term "information overload" to describe how too much information actually makes decision making harder, not easier. I think...

A cyberespionage group known as Careto or The Mask, perhaps state-sponsored, is known to have attempted to exploit a vulnerability in older versions of Kaspersky antivirus products in order to evade detection. The group compromised computers belonging to hundreds of government and private organizations from more than 30 countries before its activities were exposed in February 2014.

While these are mainly examples of using antivirus vulnerabilities to evade detection, there's also a demand for remote code execution exploits affecting antivirus products and these are being sold by specialized brokers on the largely unregulated exploit market.

Among the emails leaked last year from Italian surveillance firm Hacking Team there is a document with exploits offered for sale by an outfit called Vulnerabilities Brokerage International. The document lists various privilege escalation, information disclosure and detection bypassing exploits for multiple antivirus products, and also a remote code execution exploit for ESET NOD32 Antivirus with the status "sold."

This has been going on for over a decade, according to Gunter Ollmann, chief security officer at intrusion detection vendor Vectra and former chief technology officer at security research firm IOActive. There are companies that specialize in reverse-engineering popular desktop antivirus products from countries where their clients have an interest, he said via email. They also reverse-engineer existing malware so they can hijack already infected systems, he said.

If intelligence agencies from the U.S. and Europe are interested in such exploits, there's no reason to think that those from Russia, China and other cyber powers are not. In fact, Chinese and Russian cyberespionage groups have repeatedly proven their ability to find and develop exploits for previously unknown vulnerabilities in popular applications, so applying those same skills to antivirus products shouldn't be a problem.

Even some antivirus vendors agree that targeted attacks against antivirus products are likely, though they haven't seen any so far.
"In our predictions for 2016, we specifically mention that attacks on security researchers and security vendors could be a future trend in information security; however, we do not believe these will be widespread attacks," said Vyacheslav Zakorzhevsky, the head of anti-malware research at Kaspersky Lab, via email. "For example, security researchers may be attacked via compromised research tools, and since all software contains vulnerabilities, there is a possibility that security software could be impacted on a targeted and limited basis."

Antivirus vendor Bitdefender said in an emailed statement that targeted attacks against endpoint security programs "are definitely possible," but that they will likely be aimed at enterprise environments, not consumers.

c80f0f1006
Reply all
Reply to author
Forward
0 new messages