Category: blog

  • Password security is 1% choosing a half-decent password, 99% not using it anywhere else

    It is a truth generally acknowledged that there is no such thing as absolute security. Security is always a compromise with usability, and good security is about finding the right kind of compromise for the particular threat model you’re defending against. Password security is a good example. Ideally, one should use a very strong unique…

  • Save the dates: VB2018 to take place 3-5 October 2018

    While we hope that you have already circled the dates of 4-6 October 2017 in your agendas, and that you will join us and security experts from around the world for VB2017 in Spain ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your diaries:…

  • Save the dates: VB2018 to take place 3-5 October 2018

    While we hope that you have already circled the dates of 4-6 October 2017 in your agendas, and that you will join us and security experts from around the world for VB2017 in Spain ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your diaries:…

  • Review: BSides Athens 2017

    BSides London has been a regular fixture on the Virus Bulletin agenda for the past few years, but its international audience (thanks to the event being held in parallel with InfoSecurity Europe ) makes it a bit of an exception: most BSides events are organized by and for local communities, with only a small number…

  • Review: BSides Athens 2017

    BSides London has been a regular fixture on the Virus Bulletin agenda for the past few years, but its international audience (thanks to the event being held in parallel with InfoSecurity Europe ) makes it a bit of an exception: most BSides events are organized by and for local communities, with only a small number…

  • Let’s not help attackers by spreading fear, uncertainty and doubt

    A week and a half after the outbreak of (Not)Petya , we are still not 100% certain about the motivation of the attackers. Was it a (failed) attempt to extort money from a large number of organizations? Did a nation-state-affiliated group intend to take an armed conflict into the cyber realm by causing as much…

  • Calling next-gen security researchers: student discount for VB2017 announced

    Next-gen firewalls, next-gen anti-virus. At Virus Bulletin , we follow the ‘next-gen’ trends with interest, if only because behind the marketing there is often very interesting technology. But there is another kind of next-gen that we are even more interested in: next-gen security researchers. In three months’ time, some of the greatest minds in security…

  • Let’s not help attackers by spreading fear, uncertainty and doubt

    A week and a half after the outbreak of (Not)Petya , we are still not 100% certain about the motivation of the attackers. Was it a (failed) attempt to extort money from a large number of organizations? Did a nation-state-affiliated group intend to take an armed conflict into the cyber realm by causing as much…

  • Calling next-gen security researchers: student discount for VB2017 announced

    Next-gen firewalls, next-gen anti-virus. At Virus Bulletin , we follow the ‘next-gen’ trends with interest, if only because behind the marketing there is often very interesting technology. But there is another kind of next-gen that we are even more interested in: next-gen security researchers. In three months’ time, some of the greatest minds in security…

  • Nominations opened for fourth Péter Szőr Award

    Virus Bulletin is seeking nominations for the fourth annual Péter Szőr Award . The award was inaugurated during the VB2014 conference, in honour of late security researcher and malware expert Péter Szőr , who passed away in November 2013. It is given to for the best piece of technical security research published during the preceding year;…