Blog keyword search

VB2014 preview: Apple without a shell - iOS under targeted attack

FireEye researchers show a large attack vector for Apple's mobile operating system.
FireEye researchers show a large attack vector for Apple's mobile operating system.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are… https://www.virusbulletin.com/blog/2014/09/preview-apple-without-shell-ios-under-targeted-attack/

VB2014 preview: The three levels of exploit testing

Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.
Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.In the weeks running up to VB2014 (the 24th Virus Bulletin International… https://www.virusbulletin.com/blog/2014/09/preview-three-levels-exploit-testing/

VB2014 preview: last-minute papers added to the programme

Hot topics to be covered at VB2014 conference in Seattle.
Hot topics to be covered at VB2014 conference in Seattle. Although most of the VB2014 conference programme was announced back in April, it looks anything but dated. A paper on… https://www.virusbulletin.com/blog/2014/09/preview-last-minute-papers-added-programme/

VB2014 preview: Swipe away, we're watching you

Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.
Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.In the weeks running up to VB2014 (the 24th Virus Bulletin International… https://www.virusbulletin.com/blog/2014/09/preview-swipe-away-we-re-watching-you/

VB2014 preview: Design to discover: security analytics with 3D visualization engine

Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains.
Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference),… https://www.virusbulletin.com/blog/2014/08/preview-design-discover-security-analytics-3d-visualization-engine/

VB2014 preview: Methods of malware persistence on Mac OS X

Patrick Wardle shows that OS X users really have something to worry about.
Patrick Wardle shows that OS X users really have something to worry about.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some… https://www.virusbulletin.com/blog/2014/08/preview-methods-malware-persistence-mac-os-x/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Labelling spam through the analysis of protocol patterns

Andrei Husanu and Alexandru Trifan look at what TCP packet sizes can teach us.
Andrei Husanu and Alexandru Trifan look at what TCP packet sizes can teach us.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at… https://www.virusbulletin.com/blog/2014/08/preview-labelling-spam-through-analysis-protocol-patterns/

VB2014 preview: Optimized mal-ops. Hack the ad network like a boss

Researchers Vadim Kotov and Rahul Kashyap to discuss how advertisements are the new exploit kits.
Researchers Vadim Kotov and Rahul Kashyap to discuss how advertisements are the new exploit kits.In the weeks running up to VB2014 (the 24th Virus Bulletin International… https://www.virusbulletin.com/blog/2014/08/preview-optimized-mal-ops-hack-ad-network-boss/

VB2014 preview: P0wned by a barcode

Fabio Assolini to speak about malware targeting boletos.
Fabio Assolini to speak about malware targeting boletos.In the weeks running up to VB2014, we will look at some of the research that will be presented at the conference. In the… https://www.virusbulletin.com/blog/2014/08/preview-p0wned-barcode/

Call for last-minute papers for VB2014 announced

Seven speaking slots waiting to be filled with presentations on 'hot' security topics.
Seven speaking slots waiting to be filled with presentations on 'hot' security topics. Earlier this year, we announced the programme for VB2014: three days filled with excellent… https://www.virusbulletin.com/blog/2014/07/call-last-minute-papers-announced/

Exploit kit requires link to be clicked before redirection

Automatic analysis of malicious payloads becomes a little bit harder again.
Automatic analysis of malicious payloads becomes a little bit harder again. A security researcher at ESET has discovered how a malicious site serving the Angler exploit kit… https://www.virusbulletin.com/blog/2014/06/exploit-kit-requires-link-be-clicked-redirection/

VB2014 programme and keynote announced

Exciting range of topics to be covered at VB conference in Seattle this September; Katie Moussouris to deliver keynote address.
Exciting range of topics to be covered at VB conference in Seattle this September; Katie Moussouris to deliver keynote address. Altogether, almost 150 proposals were submitted for… https://www.virusbulletin.com/blog/2014/04/programme-and-keynote-announced/

VB2014: more of the same, plus something a little different

Hackers, network security researchers encouraged to submit abstracts for the conference.
Hackers, network security researchers encouraged to submit abstracts for the conference. The issuing of the call for papers for a VB conference is always an important event for us,… https://www.virusbulletin.com/blog/2013/12/more-same-plus-something-little-different/

VB2014 - location, location, location

Cat escapes bag as details of VB2014 conference are announced.
Cat escapes bag as details of VB2014 conference are announced. Keeping shtum about the dates and details for VB2014 - the 24th Virus Bulletin International Conference - has not… https://www.virusbulletin.com/blog/2013/01/location-location-location/

« Previous 123 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.