Category: blog

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • VB2016: Important Information About the Hotel

    We are delighted that many people have already registered for VB2016, and registration for VB2016 will remain open right up until the start of the conference. However, the large number of registrations does mean that, for the moment, the conference hotel is fully booked for accommodation (sold out) on Friday 7 October. Of course, the…

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…

  • Guest blog: Nemucod ransomware analysis

    In the run up to VB2016 , we invited the sponsors of the conference to write guest posts for our blog. In the third of this series, Webroot’s Jesse Lopez writes about the Nemucod ransomware. Note: some security vendors refer to the downloader component alone (which has been seen to download other kinds of malware as well) as ‘Nemucod’.…

  • Guest blog: Nemucod ransomware analysis

    In the run up to VB2016 , we invited the sponsors of the conference to write guest posts for our blog. In the third of this series, Webroot’s Jesse Lopez writes about the Nemucod ransomware. Note: some security vendors refer to the downloader component alone (which has been seen to download other kinds of malware as well) as ‘Nemucod’.…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…