Category: blog

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • Benefit now from early bird discount tickets for VB2018

    In a little over three months, security experts from around the world will gather in Montreal for VB2018 , the 28th Virus Bulletin International Conference. We have an exciting programme lined up already, with keynote addresses from John Lambert ( Microsoft ) and Wendy Nather ( Duo Security ); workshops on Android reverse engineering and…

  • Benefit now from early bird discount tickets for VB2018

    In a little over three months, security experts from around the world will gather in Montreal for VB2018 , the 28th Virus Bulletin International Conference. We have an exciting programme lined up already, with keynote addresses from John Lambert ( Microsoft ) and Wendy Nather ( Duo Security ); workshops on Android reverse engineering and…

  • We are more ready for IPv6 email than we may think

    In email security circles, IPv6 is the elephant in the room. While the transition from IPv4 to IPv6 is a relatively smooth affair for most of the Internet, and few people will have noticed that a large part of Internet traffic is currently using IPv6, email is still lagging behind: RIPE, Europe’s Regional Internet Registry,…

  • We are more ready for IPv6 email than we may think

    In email security circles, IPv6 is the elephant in the room. While the transition from IPv4 to IPv6 is a relatively smooth affair for most of the Internet, and few people will have noticed that a large part of Internet traffic is currently using IPv6, email is still lagging behind: RIPE, Europe’s Regional Internet Registry,…

  • Subtle change could see a reduction in installation of malicious Chrome extensions

    As modern browsers have become harder to attack, malware authors have found a simple way around this: by working with the browser rather than against it. More particularly, by tricking users into installing extensions they host on official browser stores, like the Google Chrome Store . Malicious Chrome extensions have been used for various nefarious…

  • Subtle change could see a reduction in installation of malicious Chrome extensions

    As modern browsers have become harder to attack, malware authors have found a simple way around this: by working with the browser rather than against it. More particularly, by tricking users into installing extensions they host on official browser stores, like the Google Chrome Store . Malicious Chrome extensions have been used for various nefarious…

  • Paper: EternalBlue: a prominent threat actor of 2017–2018

    A little over a year ago, one of the defining security events of the decade occurred: the WannaCry outbreak. A damaging and destructive cyber attack that hit the UK’s National Health Service particularly hard. The high infection rate of WannaCry was in large part thanks to its implementation of ‘EternalBlue’, an exploit of a remote…

  • Paper: EternalBlue: a prominent threat actor of 2017–2018

    A little over a year ago, one of the defining security events of the decade occurred: the WannaCry outbreak. A damaging and destructive cyber attack that hit the UK’s National Health Service particularly hard. The high infection rate of WannaCry was in large part thanks to its implementation of ‘EternalBlue’, an exploit of a remote…

  • ‘North Korea’ a hot subject among VB2018 talks

    A few years ago, I somehow got involved in the discussion of a run-of-the-mill malicious spam campaign and ended up speaking to a journalist from the Daily Telegraph . “Is it true that North Korea may be behind this campaign?”, the journalist asked me – I had a hard time trying to keep a straight…