{"id":4647,"date":"2014-10-22T10:16:30","date_gmt":"2014-10-22T07:16:30","guid":{"rendered":"http:\/\/www.onlinemagazine.gr\/?p=4647"},"modified":"2014-10-22T10:41:30","modified_gmt":"2014-10-22T07:41:30","slug":"eset-nod32-antivirus-8-%ce%ba%ce%b1%ce%b9-eset-smart-security-8","status":"publish","type":"post","link":"https:\/\/www.onlinemagazine.gr\/?p=4647","title":{"rendered":"ESET NOD32 Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security 8"},"content":{"rendered":"<p lang=\"en-US\"><a href=\"http:\/\/www.onlinemagazine.gr\/wp-content\/uploads\/PANEL_ANTITHEFT_SIGNIN.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-4648\" title=\"PANEL_ANTITHEFT_SIGNIN\" src=\"http:\/\/www.onlinemagazine.gr\/wp-content\/uploads\/PANEL_ANTITHEFT_SIGNIN-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>\u0397 <a href=\"http:\/\/www.eset.com\/gr\"><span style=\"text-decoration: underline;\">ESET<\/span><\/a> \u03b1\u03bd\u03b1\u03ba\u03bf\u03af\u03bd\u03c9\u03c3\u03b5 \u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u03c4\u03c9\u03bd \u03ba\u03bf\u03c1\u03c5\u03c6\u03b1\u03af\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03c4\u03b7\u03c2 ESET NOD32\u00a0Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security\u00a08. \u03a3\u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2, \u03be\u03b5\u03c7\u03c9\u03c1\u03af\u03b6\u03bf\u03c5\u03bd \u03bf\u03b9 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 Botnet Protection \u03ba\u03b1\u03b9 \u03c4\u03bf \u03b2\u03b5\u03bb\u03c4\u03b9\u03c9\u03bc\u03ad\u03bd\u03bf Exploit Blocker, \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03b9 \u03b1\u03c0\u03cc exploits \u03ba\u03b1\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03b5\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b5\u03c2 anti-phishing \u03ba\u03b1\u03b9 \u03c3\u03ac\u03c1\u03c9\u03c3\u03b7\u03c2 \u03c4\u03c9\u03bd social media. \u00ab\u039f\u03b9 \u03bd\u03ad\u03b5\u03c2 \u03b1\u03c5\u03c4\u03ad\u03c2 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03bf \u03b5\u03c0\u03af\u03c0\u03b5\u03b4\u03bf \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2 \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd ESET NOD32\u00a0Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security\u00a08, \u03cc\u03c4\u03b1\u03bd \u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03bf\u03c5\u03bd \u03c4\u03bf email \u03c4\u03bf\u03c5\u03c2, \u03cc\u03c4\u03b1\u03bd \u03c3\u03b5\u03c1\u03c6\u03ac\u03c1\u03bf\u03c5\u03bd \u03c3\u03c4\u03bf \u03b4\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf \u03ae \u03cc\u03c4\u03b1\u03bd \u03b5\u03bb\u03ad\u03b3\u03c7\u03bf\u03c5\u03bd online \u03c4\u03bf \u03c5\u03c0\u03cc\u03bb\u03bf\u03b9\u03c0\u03bf \u03c4\u03bf\u03c5 \u03c4\u03c1\u03b1\u03c0\u03b5\u03b6\u03b9\u03ba\u03bf\u03cd \u03c4\u03bf\u03c5\u03c2 \u03bb\u03bf\u03b3\u03b1\u03c1\u03b9\u03b1\u03c3\u03bc\u03bf\u03cd\u00bb \u03b4\u03ae\u03bb\u03c9\u03c3\u03b5 \u03bf Ignacio Sbampato, Chief Sales and Marketing Officer \u03c4\u03b7\u03c2 ESET. \u00ab\u03a3\u03b5 \u03c3\u03c5\u03bd\u03b4\u03c5\u03b1\u03c3\u03bc\u03cc \u03bc\u03b5 \u03c4\u03b7 \u03b2\u03c1\u03b1\u03b2\u03b5\u03c5\u03bc\u03ad\u03bd\u03b7 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 anti-malware, \u03b5\u03af\u03bc\u03b1\u03c3\u03c4\u03b5 \u03c3\u03af\u03b3\u03bf\u03c5\u03c1\u03bf\u03b9 \u03cc\u03c4\u03b9 \u03c4\u03b1 \u03b5\u03c0\u03b9\u03c0\u03bb\u03ad\u03bf\u03bd \u03b1\u03c5\u03c4\u03ac \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac \u03b8\u03b1 \u03c0\u03c1\u03bf\u03c3\u03b4\u03ce\u03c3\u03bf\u03c5\u03bd \u03bc\u03b5\u03b3\u03ac\u03bb\u03b7 \u03b1\u03be\u03af\u03b1 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c0\u03b5\u03bb\u03ac\u03c4\u03b5\u03c2 \u03bc\u03b1\u03c2\u00bb.<\/p>\n<p lang=\"sk-SK\">\u03a3\u03cd\u03bc\u03c6\u03c9\u03bd\u03b1 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03b5\u03ba\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 \u00ab<a href=\"http:\/\/www.cisco.com\/web\/offer\/gist_ty2_asset\/Cisco_2014_ASR.pdf\"><span style=\"text-decoration: underline;\">Annual<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Security<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Report<\/span><span style=\"text-decoration: underline;\"> 2014<\/span><\/a>\u00bb \u03c4\u03b7\u03c2 Cisco \u03ba\u03b1\u03b9 \u00ab<a href=\"http:\/\/blogs.cisco.com\/security\/cisco-2014-midyear-security-report-exploit-kit-creators-vying-for-market-leader-role\/\"><span style=\"text-decoration: underline;\">2014 <\/span><span style=\"text-decoration: underline;\">Midyear<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Security<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Report<\/span><\/a>\u00bb, \u03bc\u03b5\u03c4\u03b1\u03be\u03cd \u03cc\u03bb\u03c9\u03bd \u03c4\u03c9\u03bd \u03b4\u03b5\u03b9\u03ba\u03c4\u03ce\u03bd \u03c0\u03b1\u03c1\u03b1\u03b2\u03af\u03b1\u03c3\u03b7\u03c2 (IOC), \u03c4\u03b1 exploits \u03c3\u03b5 Java \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf 91% \u03ba\u03b1\u03c4\u03ac \u03c4\u03bf \u039d\u03bf\u03ad\u03bc\u03b2\u03c1\u03b9\u03bf 2013, \u03b5\u03bd\u03ce \u03ba\u03b1\u03c4\u03ac \u03c4\u03bf \u039c\u03ac\u03b9\u03bf \u03c4\u03bf\u03c5 2014 \u03b1\u03c5\u03be\u03ac\u03bd\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c3\u03c4\u03bf 93%. \u0391\u03ba\u03bf\u03bb\u03bf\u03c5\u03b8\u03bf\u03cd\u03bd \u03c4\u03bf Adobe Reader, \u03c4\u03bf Microsoft Excel \u03ba\u03b1\u03b9 \u03c4\u03bf Microsoft Word, \u03bc\u03b5 \u03bc\u03b5\u03c1\u03af\u03b4\u03b9\u03bf 3%.<\/p>\n<p lang=\"sk-SK\">\u0391\u03c5\u03c4\u03bf\u03af \u03bf\u03b9 \u03b4\u03b5\u03af\u03ba\u03c4\u03b5\u03c2 \u03c0\u03b1\u03c1\u03b1\u03b2\u03af\u03b1\u03c3\u03b7\u03c2 \u03c3\u03c5\u03bd\u03ae\u03b8\u03c9\u03c2 \u03b1\u03c0\u03bf\u03ba\u03b1\u03bb\u03cd\u03c0\u03c4\u03bf\u03c5\u03bd \u03bc\u03af\u03b1 \u03b1\u03c3\u03c5\u03bd\u03ae\u03b8\u03b9\u03c3\u03c4\u03b7 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ac \u03b5\u03bd\u03cc\u03c2 \u03c3\u03c5\u03b3\u03ba\u03b5\u03ba\u03c1\u03b9\u03bc\u03ad\u03bd\u03bf\u03c5 \u03c4\u03bc\u03ae\u03bc\u03b1\u03c4\u03bf\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03ae \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd. \u0397 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ac \u03b1\u03c5\u03c4\u03ae \u03b5\u03ba\u03b4\u03b7\u03bb\u03ce\u03bd\u03b5\u03c4\u03b1\u03b9 \u03ba\u03b1\u03c4\u03ac \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03c3\u03c0\u03ac\u03b8\u03b5\u03b9\u03b1 \u03bd\u03b1 \u03b5\u03ba\u03bc\u03b5\u03c4\u03b1\u03bb\u03bb\u03b5\u03c5\u03c4\u03b5\u03af \u03b5\u03b3\u03b3\u03b5\u03bd\u03ae \u03c4\u03c1\u03c9\u03c4\u03ac \u03c3\u03b7\u03bc\u03b5\u03af\u03b1 \u03c4\u03bf\u03c5 \u03bb\u03bf\u03b3\u03b9\u03c3\u03bc\u03b9\u03ba\u03bf\u03cd, glitches \u03ae bugs \u2013 \u03bc\u03b5 \u03c3\u03c4\u03cc\u03c7\u03bf \u03bd\u03b1 \u03c0\u03ac\u03c1\u03b5\u03b9 \u03c4\u03bf\u03bd \u03ad\u03bb\u03b5\u03b3\u03c7\u03bf \u03c4\u03bf\u03c5 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae. \u03a7\u03ac\u03c1\u03b7 \u03c3\u03c4\u03bf \u03b2\u03b5\u03bb\u03c4\u03b9\u03c9\u03bc\u03ad\u03bd\u03bf <a href=\"http:\/\/www.eset.com\/gr\/about\/technology\/\"><span style=\"text-decoration: underline;\">Exploit<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Blocker<\/span><\/a> \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd ESET NOD32\u00a0Antivirus 8 and ESET Smart Security\u00a08 \u03bf\u03b9 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03c5\u03bc\u03ad\u03bd\u03bf\u03b9 \u03b1\u03c0\u03cc \u03c4\u03ad\u03c4\u03bf\u03b9\u03b5\u03c2 \u03b1\u03c0\u03b5\u03b9\u03bb\u03ad\u03c2.<\/p>\n<p>\u03a3\u03c4\u03b7 \u03bb\u03cd\u03c3\u03b7 ESET Smart Security\u00a08 \u03c3\u03c5\u03bd\u03b1\u03bd\u03c4\u03bf\u03cd\u03bc\u03b5 \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03c4\u03b7 \u03bd\u03ad\u03b1 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b1 <a href=\"http:\/\/www.eset.com\/gr\/about\/technology\/\"><span style=\"text-decoration: underline;\">Botnet<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Protection<\/span><\/a>, \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03b9 \u03c4\u03bf\u03bd \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae \u03c3\u03b5 \u03c0\u03b5\u03c1\u03af\u03c0\u03c4\u03c9\u03c3\u03b7 \u03c0\u03c1\u03bf\u03c3\u03c0\u03ac\u03b8\u03b5\u03b9\u03b1\u03c2 \u03bd\u03b1 \u03b1\u03c0\u03bf\u03ba\u03c4\u03b7\u03b8\u03b5\u03af \u03bf \u03ad\u03bb\u03b5\u03b3\u03c7\u03cc\u03c2 \u03c4\u03bf\u03c5 \u03b1\u03c0\u03bf\u03bc\u03b1\u03ba\u03c1\u03c5\u03c3\u03bc\u03ad\u03bd\u03b1 \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03c7\u03c1\u03b7\u03c3\u03b9\u03bc\u03bf\u03c0\u03bf\u03b9\u03b7\u03b8\u03b5\u03af \u03c9\u03c2 \u03bc\u03ad\u03c1\u03bf\u03c2 \u03ba\u03ac\u03c0\u03bf\u03b9\u03bf\u03c5 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03bc\u03b5 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf\u03c5\u03c2 \u03c3\u03ba\u03bf\u03c0\u03bf\u03cd\u03c2. \u03a3\u03c4\u03b7\u03bd \u03ad\u03ba\u03b8\u03b5\u03c3\u03b7 \u00ab<a href=\"http:\/\/www.verizonenterprise.com\/DBIR\/2014\/\"><span style=\"text-decoration: underline;\">2014 <\/span><span style=\"text-decoration: underline;\">Verizon<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Data<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Breach<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Investigation<\/span><span style=\"text-decoration: underline;\"> <\/span><span style=\"text-decoration: underline;\">Report<\/span><\/a>\u00bb \u03c6\u03b1\u03af\u03bd\u03b5\u03c4\u03b1\u03b9 \u03cc\u03c4\u03b9 \u03b7 \u03b4\u03c1\u03b1\u03c3\u03c4\u03b7\u03c1\u03b9\u03cc\u03c4\u03b7\u03c4\u03b1 \u03c4\u03c9\u03bd botnet \u03b1\u03c0\u03bf\u03c4\u03ad\u03bb\u03b5\u03c3\u03b5 \u03c4\u03b7 \u03bc\u03b5\u03b3\u03b1\u03bb\u03cd\u03c4\u03b5\u03c1\u03b7 \u03bc\u03bf\u03bd\u03b1\u03b4\u03b9\u03ba\u03ae \u03ba\u03b1\u03c4\u03b7\u03b3\u03bf\u03c1\u03af\u03b1 \u03ba\u03b1\u03c4\u03b1\u03b3\u03b5\u03b3\u03c1\u03b1\u03bc\u03bc\u03ad\u03bd\u03bf\u03c5 crimeware \u03b1\u03b3\u03b3\u03af\u03b6\u03bf\u03bd\u03c4\u03b1\u03c2 \u03c4\u03bf 86%.<\/p>\n<p lang=\"sk-SK\">\u039c\u03ad\u03c3\u03b1 \u03c3\u03c4\u03bf 2013, \u03c0\u03b1\u03c1\u03bf\u03c5\u03c3\u03b9\u03ac\u03c3\u03c4\u03b7\u03ba\u03b1\u03bd \u03b1\u03c1\u03ba\u03b5\u03c4\u03ad\u03c2 \u03c3\u03b7\u03bc\u03b1\u03bd\u03c4\u03b9\u03ba\u03ad\u03c2 \u03b5\u03c0\u03b9\u03b8\u03ad\u03c3\u03b5\u03b9\u03c2 botnet. \u0397 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 \u03c4\u03b7\u03c2  \u03bb\u03cd\u03c3\u03b7\u03c2 ESET Smart Security<sup> <\/sup>8 \u03b1\u03c0\u03bf\u03ba\u03b1\u03bb\u03cd\u03c0\u03c4\u03b5\u03b9 \u03c0\u03b1\u03c1\u03ac\u03c4\u03c5\u03c0\u03b1 \u03b4\u03b9\u03b1\u03b4\u03b9\u03ba\u03c4\u03c5\u03b1\u03ba\u03ac \u03c0\u03c1\u03cc\u03c4\u03c5\u03c0\u03b1 \u03b5\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03af\u03b1\u03c2 \u03c0\u03bf\u03c5 \u03b5\u03af\u03bd\u03b1\u03b9 \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac \u03c4\u03c9\u03bd <span style=\"text-decoration: underline;\"><a href=\"http:\/\/virusradar.com\/en\/glossary\/botnet\">Botnet<\/a><\/span>, \u03cc\u03c0\u03c9\u03c2 \u03c3\u03c5\u03bd\u03ad\u03b2\u03b7 \u03ba\u03b1\u03b9 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b1\u03bd\u03b1\u03ba\u03ac\u03bb\u03c5\u03c8\u03b7 \u03c4\u03b7\u03c2 <a href=\"http:\/\/www.welivesecurity.com\/2014\/03\/18\/operation-windigo-the-vivisection-of-a-large-linux-server-side-credential-stealing-malware-campaign\/\"><span style=\"text-decoration: underline;\">\u0395\u03c0\u03b9\u03c7\u03b5\u03af\u03c1\u03b7\u03c3\u03b7 <\/span><span style=\"text-decoration: underline;\">Windigo<\/span><\/a> \u03b1\u03c0\u03cc \u03c4\u03b1 \u03b5\u03c1\u03b3\u03b1\u03c3\u03c4\u03ae\u03c1\u03b9\u03b1 \u0395\u03c1\u03b5\u03c5\u03bd\u03ce\u03bd \u03c4\u03b7\u03c2 ESET \u03c4\u03b7\u03bd \u03c0\u03b5\u03c1\u03b1\u03c3\u03bc\u03ad\u03bd\u03b7 \u03ac\u03bd\u03bf\u03b9\u03be\u03b7. \u0391\u03c0\u03bf\u03ba\u03ac\u03bb\u03c5\u03c8\u03b5 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03bf\u03c5\u03c2 \u03b1\u03c0\u03cc 25.000 \u03bc\u03bf\u03bb\u03c5\u03c3\u03bc\u03ad\u03bd\u03bf\u03c5\u03c2 server, \u03c0\u03bf\u03c5 \u03b3\u03b9\u03b1 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b1\u03c0\u03cc \u03b4\u03cd\u03bf \u03c7\u03c1\u03cc\u03bd\u03b9\u03b1 \u03b1\u03bd\u03b1\u03ba\u03b1\u03c4\u03b5\u03cd\u03b8\u03c5\u03bd\u03b1\u03bd \u03ba\u03b1\u03b8\u03b7\u03bc\u03b5\u03c1\u03b9\u03bd\u03ac \u03bc\u03b9\u03c3\u03cc \u03b5\u03ba\u03b1\u03c4\u03bf\u03bc\u03bc\u03cd\u03c1\u03b9\u03bf \u03b4\u03b9\u03b1\u03b4\u03b9\u03ba\u03c4\u03c5\u03b1\u03ba\u03bf\u03cd\u03c2 \u03b5\u03c0\u03b9\u03c3\u03ba\u03ad\u03c0\u03c4\u03b5\u03c2 \u03c3\u03b5 \u03ba\u03b1\u03ba\u03cc\u03b2\u03bf\u03c5\u03bb\u03bf \u03c0\u03b5\u03c1\u03b9\u03b5\u03c7\u03cc\u03bc\u03b5\u03bd\u03bf. \u03a3\u03c5\u03bd\u03bf\u03bb\u03b9\u03ba\u03ac, \u03c4\u03bf botnet \u03ad\u03b4\u03c9\u03c3\u03b5 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03b5\u03c0\u03b9\u03c4\u03b9\u03b8\u03ad\u03bc\u03b5\u03bd\u03bf\u03c5\u03c2 \u03c4\u03b7 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b1 \u03bd\u03b1 \u03c3\u03c4\u03ad\u03bb\u03bd\u03bf\u03c5\u03bd \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b1 \u03b1\u03c0\u03cc 35.000.000 \u03bc\u03b7\u03bd\u03cd\u03bc\u03b1\u03c4\u03b1 spam \u03ba\u03b1\u03b8\u03b7\u03bc\u03b5\u03c1\u03b9\u03bd\u03ac.<\/p>\n<p>\u03a3\u03c4\u03b7 \u03bb\u03cd\u03c3\u03b7 ESET Smart Security 8 \u03c0\u03b5\u03c1\u03b9\u03bb\u03b1\u03bc\u03b2\u03ac\u03bd\u03bf\u03bd\u03c4\u03b1\u03b9 \u03b5\u03c0\u03af\u03c3\u03b7\u03c2 \u03b1\u03c0\u03bf\u03b4\u03b5\u03b4\u03b5\u03b9\u03b3\u03bc\u03ad\u03bd\u03b1 \u03c7\u03b1\u03c1\u03b1\u03ba\u03c4\u03b7\u03c1\u03b9\u03c3\u03c4\u03b9\u03ba\u03ac \u03cc\u03c0\u03c9\u03c2 \u03c4\u03bf Anti-theft, \u0393\u03bf\u03bd\u03b9\u03ba\u03cc\u03c2 \u0388\u03bb\u03b5\u03b3\u03c7\u03bf\u03c2 \u03ba\u03b1\u03b9 \u03a0\u03c1\u03bf\u03c3\u03c9\u03c0\u03b9\u03ba\u03cc Firewall.<\/p>\n<p>\u0397 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd ESET \u03ba\u03b1\u03c4\u03ad\u03c7\u03b5\u03b9 \u03c4\u03bf \u03c1\u03b5\u03ba\u03cc\u03c1 \u03bc\u03b5 \u03c4\u03b9\u03c2 \u03c0\u03b5\u03c1\u03b9\u03c3\u03c3\u03cc\u03c4\u03b5\u03c1\u03b5\u03c2 \u03c3\u03c5\u03bd\u03b5\u03c7\u03cc\u03bc\u03b5\u03bd\u03b5\u03c2 \u03b4\u03b9\u03b1\u03ba\u03c1\u03af\u03c3\u03b5\u03b9\u03c2 VB100 \u03c3\u03c4\u03b7\u03bd \u03b1\u03b3\u03bf\u03c1\u03ac.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0397 ESET \u03b1\u03bd\u03b1\u03ba\u03bf\u03af\u03bd\u03c9\u03c3\u03b5 \u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u03c4\u03c9\u03bd \u03ba\u03bf\u03c1\u03c5\u03c6\u03b1\u03af\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03c4\u03b7\u03c2 ESET NOD32\u00a0Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security\u00a08. \u03a3\u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2, \u03be\u03b5\u03c7\u03c9\u03c1\u03af\u03b6\u03bf\u03c5\u03bd \u03bf\u03b9 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 Botnet Protection \u03ba\u03b1\u03b9 \u03c4\u03bf \u03b2\u03b5\u03bb\u03c4\u03b9\u03c9\u03bc\u03ad\u03bd\u03bf Exploit Blocker, \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c4\u03b5\u03cd\u03b5\u03b9 \u03b1\u03c0\u03cc exploits \u03ba\u03b1\u03b9 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03b5\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03cc\u03c4\u03b7\u03c4\u03b5\u03c2 anti-phishing \u03ba\u03b1\u03b9 \u03c3\u03ac\u03c1\u03c9\u03c3\u03b7\u03c2 \u03c4\u03c9\u03bd social media. \u00ab\u039f\u03b9 \u03bd\u03ad\u03b5\u03c2 \u03b1\u03c5\u03c4\u03ad\u03c2 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03bf\u03c5\u03bd \u03c0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03bf \u03b5\u03c0\u03af\u03c0\u03b5\u03b4\u03bf \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c3\u03c4\u03bf\u03c5\u03c2 \u03c7\u03c1\u03ae\u03c3\u03c4\u03b5\u03c2 \u03c4\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4648,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"slim_seo":{"title":"ESET NOD32 Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security 8 - OnLine Magazine","description":"\u0397 ESET \u03b1\u03bd\u03b1\u03ba\u03bf\u03af\u03bd\u03c9\u03c3\u03b5 \u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u03c4\u03c9\u03bd \u03ba\u03bf\u03c1\u03c5\u03c6\u03b1\u03af\u03c9\u03bd \u03bb\u03cd\u03c3\u03b5\u03c9\u03bd \u03c4\u03b7\u03c2 ESET NOD32\u00a0Antivirus 8 \u03ba\u03b1\u03b9 ESET Smart Security\u00a08. \u03a3\u03c4\u03b9\u03c2 \u03bd\u03ad\u03b5\u03c2 \u03b5\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2, \u03be\u03b5\u03c7\u03c9\u03c1\u03af\u03b6\u03bf\u03c5\u03bd \u03bf\u03b9 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03af\u03b5\u03c2 Bot"},"footnotes":""},"categories":[139],"tags":[1709,1708,2160],"class_list":["post-4647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-daily-review","tag-eset-nod32-antivirus-8","tag-eset-smart-security-8","tag-2160"],"_links":{"self":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/4647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4647"}],"version-history":[{"count":4,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/4647\/revisions"}],"predecessor-version":[{"id":4651,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/posts\/4647\/revisions\/4651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=\/wp\/v2\/media\/4648"}],"wp:attachment":[{"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onlinemagazine.gr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}