VB2017 preview: Calling all PUA fighters

Posted by   Martijn Grooten on   Aug 31, 2017

While a lot of attention is focused on the fight against advanced malware, a different kind of threat is providing just as big a headache for security companies: that of apps (often free ones) whose behaviours sit right on the limits of what is acceptable from a security point of view. The "better safe than sorry" approach preferred by security vendors usually doesn't align with the views of their customers – or those of the often powerful lawyers employed by the vendors of some of these apps.

Last year, industry veteran Dennis Batchelder set up AppEsteem to take an interesting and pragmatic approach to this issue. Rather than come up with even more complicated ways of blocking potentially unwanted apps, he is working with the app developers and distributors themselves, to ensure they stay within the limits of what is acceptable from a security point of view. AppEsteem then provides feeds and services to security vendors, to help them avoid blocking such apps – while at the same time, making it easier to block those that do engage in malicious or deceptive behaviour.

We have asked Dennis to give a Small Talk at VB2017 to discuss how this works, and to explain how security vendors and testers can make use of AppEsteem's services.

Don't forget to register for VB2017 to learn about the latest threats, how to fight them and how to collaborate with others in the industry.

VB2017-325w.jpg

 

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Domestic Kitten: an Iranian surveillance program

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video…

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

VB2019 paper: DNS on fire

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

German Dridex spam campaign is unfashionably large

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.