Posted by Martijn Grooten on Dec 24, 2016
As a Christmas present for the security community, we have uploaded most of the papers and videos from the VB2015 conference which took place in Prague almost 15 months ago. The Virus Bulletin crew wishes you all the best for 2017!
Read morePosted by Martijn Grooten on Dec 21, 2016
In a new paper published by Virus Bulletin, Acalvio researcher Abhishek Singh discusses some of the techniques used by malware to increase its impact by spreading further.
Read morePosted by Martijn Grooten on Dec 20, 2016
At VB2016, Kaspersky Lab researcher Kurt Baumgartner delivered a presentation on the StrongPity watering hole attacks that targeted users of encryption technologies, and which were recently featured in a report by Microsoft. Today, we share the video of Kurt's presentation.
Read morePosted by Martijn Grooten on Dec 20, 2016
Three members of the Virus Bulletin team attended the Botconf 2016 conference in Lyon, France last month, enjoying talks on subjects that ranged from state-sponsored attacks to exploit kits, and from banking trojans to cyber insurance.
Read morePosted by Helen Martin on Dec 15, 2016
"Most of you reading this article have the technical skill but do you have the people skills?" In 2000, James Wolfe urged security experts to sell themselves and their services.
Read morePosted by Martijn Grooten on Dec 12, 2016
Today, we publish the VB2016 paper and presentation (recording) by ESET researchers Jean-Ian Boutin and Anton Cherepanov, in which they look at sophisticated attacks against Russian financial institutions.
Read morePosted by Martijn Grooten on Dec 2, 2016
At Botconf 2016 this week, GoSecure researchers Masarah Paquet-Clouston and Olivier Bilodeau presented their research on the Moose botnet - something Olivier Bilodeau previously spoke about at VB2015.
Read morePosted by Martijn Grooten on Dec 2, 2016
Today, we publish the VB2016 paper and presentation (recording) by Check Point Software researchers Alexander Chailytko and Stanislav Skuratovich, which focuses on the techniques used by malware to detect virtual environments, and provides detailed technical descriptions of what can be done to defeat them.
Read morePosted by Martijn Grooten on Nov 29, 2016
While the Internet of Things blossoms with newly connected objects every day, the security and privacy of these objects is often overlooked, making the IoT a major security concern. Unfortunately, reverse-engineering so-called smart devices is not an easy task. In her VB2016 paper, Axelle Apvrille presented a novel way of analysing smart devices: by looking at the accompanying mobile app. Today, we publish both Axelle’s paper and the video recording of her VB2016 presentation.
Read morePosted by Martijn Grooten on Nov 21, 2016
Today, we publish the VB2016 paper and presentation (recording) by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Brian Bartholomew, in which they look at some of the deception tactics used in targeted attacks.
Read more