Nominations opened for second Péter Ször Award

Posted by   Virus Bulletin on   Jun 29, 2015

'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.

During VB2014 in Seattle, we presented the first annual Péter Ször Award to a group of ESET researchers for their work on 'Operation Windigo'. The award was set up to commemorate of the life and work of security researcher Péter Ször, who passed away in November 2013.

Péter Ször contributed almost 40 articles to Virus Bulletin over the years, spoke at several VB conferences, and served for more than ten years on the VB advisory board. He was also well known as the author of the popular The Art of Computer Virus Research and Defense — a book which, for many, served as their first introduction to and basic grounding in computer security. Most importantly, he was known by everyone who encountered him for his great kindness and generosity.

  Pierre-Marc Bureau, Marc-Etienne Léveillé and Alexis Dorais-Joncas with their award.

We are now seeking nominations for the second award. It will be awarded for the best technical security research published between 1 July 2014 and 30 June 2015. You can use this form to send in your nominations, or else do so by emailing [email protected].

The award will be presented during VB2015, which takes place 30 September to 2 October in Prague, Czech Republic.



Posted on 29 June 2015 by Martijn Grooten
twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.