VB2016 programme announced, registration opened

Posted by   Martijn Grooten on   Apr 21, 2016

We are excited to officially announce the programme for VB2016, the 26th International Virus Bulletin Conference, which will take place in Denver, Colorado, USA 5-7 October this year.

 

VB Conference

 

Ransomware & malvertising

As every year, the VB2016 programme reflects what is going on in the world of security. With ransomware being such a hot topic, the programme includes an analysis of one of the most notorious families, Locky, as well as a presentation on how to detect new families using static analysis.

Two talks deal with the topic of malvertising, and another one with exploit kits that are used in this case - while the first Small Talk on the programme will discuss the Angler exploit kit and combined efforts to fight it.

 

APTs & targeted attacks

Of course, several talks will deal with the elite among the adversaries: APTs and targeted attacks. A paper will be presented on Disabled Sentry, a group that has been targeting the financial industry since 2009, while Anton Cherepanov and Robert Lipovský who spoke about BlackEnergy at VB2014 will present another paper on the malware that is notorious for its alleged involvement in power outages in Ukraine.

Two other papers look at APTs from a higher level: could the reports we publish be helping the threat actors? And are we sufficiently aware of false flags?

 

Mobile security, IoT, tools & esoterics

The programme includes a number papers on mobile security and the Internet of Things, as well as several papers that provide security researchers with useful tools for their work. And as always, a number of talks deal with the testing of security products and with anti-virus products themselves — just how secure are those (mobile) anti-virus products, really?

There are also some more esoteric talks, including one on hacking smart watches and one on attacks against GPS.

 

You can find the full details of all 37 papers as well as four reserve papers on the VB2016 programme here.

 

Extras

And there will be more: we have left nine places on the programme open for 'last-minute papers', the call for papers for which will go out in the summer. We will also announce two keynotes, more Small Talks and a number of extras in due course. Watch this space!

 

Register now!

Registration for VB2016 is now open - make sure you register by 30 June 2016 to get a 10% Early Bird discount.

VB2016-dates-web.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

VB2019 paper: A study of Machete cyber espionage operations in Latin America

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the…

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to…

VB2019 paper: Oops! It happened again!

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Job vacancy at VB: Security Evangelist

Virus Bulletin is recruiting for a person to be the public face of the company

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.