Category: blog
-
Password security is 1% choosing a half-decent password, 99% not using it anywhere else
It is a truth generally acknowledged that there is no such thing as absolute security. Security is always a compromise with usability, and good security is about finding the right kind of compromise for the particular threat model you’re defending against. Password security is a good example. Ideally, one should use a very strong unique…
-
Save the dates: VB2018 to take place 3-5 October 2018
While we hope that you have already circled the dates of 4-6 October 2017 in your agendas, and that you will join us and security experts from around the world for VB2017 in Spain ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your diaries:…
-
Save the dates: VB2018 to take place 3-5 October 2018
While we hope that you have already circled the dates of 4-6 October 2017 in your agendas, and that you will join us and security experts from around the world for VB2017 in Spain ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your diaries:…
-
Review: BSides Athens 2017
BSides London has been a regular fixture on the Virus Bulletin agenda for the past few years, but its international audience (thanks to the event being held in parallel with InfoSecurity Europe ) makes it a bit of an exception: most BSides events are organized by and for local communities, with only a small number…
-
Review: BSides Athens 2017
BSides London has been a regular fixture on the Virus Bulletin agenda for the past few years, but its international audience (thanks to the event being held in parallel with InfoSecurity Europe ) makes it a bit of an exception: most BSides events are organized by and for local communities, with only a small number…
-
Let’s not help attackers by spreading fear, uncertainty and doubt
A week and a half after the outbreak of (Not)Petya , we are still not 100% certain about the motivation of the attackers. Was it a (failed) attempt to extort money from a large number of organizations? Did a nation-state-affiliated group intend to take an armed conflict into the cyber realm by causing as much…
-
Calling next-gen security researchers: student discount for VB2017 announced
Next-gen firewalls, next-gen anti-virus. At Virus Bulletin , we follow the ‘next-gen’ trends with interest, if only because behind the marketing there is often very interesting technology. But there is another kind of next-gen that we are even more interested in: next-gen security researchers. In three months’ time, some of the greatest minds in security…
-
Let’s not help attackers by spreading fear, uncertainty and doubt
A week and a half after the outbreak of (Not)Petya , we are still not 100% certain about the motivation of the attackers. Was it a (failed) attempt to extort money from a large number of organizations? Did a nation-state-affiliated group intend to take an armed conflict into the cyber realm by causing as much…
-
Calling next-gen security researchers: student discount for VB2017 announced
Next-gen firewalls, next-gen anti-virus. At Virus Bulletin , we follow the ‘next-gen’ trends with interest, if only because behind the marketing there is often very interesting technology. But there is another kind of next-gen that we are even more interested in: next-gen security researchers. In three months’ time, some of the greatest minds in security…
-
Nominations opened for fourth Péter Szőr Award
Virus Bulletin is seeking nominations for the fourth annual Péter Szőr Award . The award was inaugurated during the VB2014 conference, in honour of late security researcher and malware expert Péter Szőr , who passed away in November 2013. It is given to for the best piece of technical security research published during the preceding year;…