Posted by Martijn Grooten on Mar 6, 2017
We are excited to announce the first five sponsors of VB2017, companies based in Europe, Asia and North America.
Read morePosted by Martijn Grooten on Feb 27, 2017
A recent paper showed that many HTTPS-intercepting security solutions have implemented TLS rather poorly. Does that mean we should avoid such solutions altogether?
Read morePosted by Martijn Grooten on Feb 23, 2017
Researchers from Google and CWI Amsterdam have created the first known collision of the SHA-1 hashing algorithm, making a very strong case to ditch it.
Read morePosted by Helen Martin on Feb 23, 2017
VB was saddened to learn this week of the passing of one of the pioneers of the AV industry, Ross Greenberg. This Throwback Thursday we look back at an interview with Ross in November 1995.
Read morePosted by Martijn Grooten on Feb 20, 2017
Have you analysed a new online threat? Do you know a new way to defend against such threats? Then submit an abstract in the CFP for VB2017!
Read morePosted by Martijn Grooten on Feb 17, 2017
APT reports are great for gaining an understanding of how advanced attack groups operate - however, they can also provide free QA for the threat actors. Today, we publish a VB2016 paper by Gadi Evron (Cymmetria) and Inbar Raz (Perimeter X), who discuss what they think is wrong with many APT reports and what can be done to improve them.
Read morePosted by Martijn Grooten on Feb 14, 2017
Industry veteran Mikko Hyppönen recently urged would-be security researchers to ditch their favourite pop music and listen to security podcasts on their commute to work instead. Virus Bulletin Editor Martijn Grooten shares his favourite security podcasts.
Read morePosted by Martijn Grooten on Feb 10, 2017
In a presentation at VB2016, Patrick Wardle, Director of Research at Synack, discussed the possibilities of Mac malware recording the user via the webcam. Today, we publish the video of Patrick's presentation.
Read morePosted by Martijn Grooten on Feb 9, 2017
Virus Bulletin Editor Martijn Grooten calls for the security community not to forget those most vulnerable in the digital world, including political activists living under oppressive regimes, and victims of abuse.
Read morePosted by Helen Martin on Feb 9, 2017
In early 1991, the world was a troubled place and conflict and violence were being reported globally on a daily basis. With this as a backdrop, the world of "indiscriminate" computer viruses which "victimise in a random and unpredictable manner" seemed relatively trivial to then Editor of VB, Edward Wilding.
Read more