Mindblown: a blog about philosophy.
-
VB2018 paper: The modality of mortality in domain names
The current generation of security professionals is probably more familiar with the way DNS works than they are with phone books, which are still often used as an analogy to explain DNS. Domains play a crucial role in most cyber attacks, from the very advanced to the very mundane; being able to take down or…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
VB2018 paper: Analysing compiled binaries using logic
Static analysis of malware is usually “done by a person (a security analyst) who will stare at one binary code for hours, searching for patterns – the signatures,” writes Thaís Moreira Hamasaki in her VB2018 paper. To make the analysis process faster and more effective, analysts tend to use various tools and techniques. One lesser…
-
Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019
There is a little less than a month left until the deadline (17 March) of the call for papers for VB2019 , the 29th Virus Bulletin International Conference. Over almost three decades, the Virus Bulletin Conference has built a reputation as a conference that produces solid content. Some take this to mean that we are…
-
Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019
There is a little less than a month left until the deadline (17 March) of the call for papers for VB2019 , the 29th Virus Bulletin International Conference. Over almost three decades, the Virus Bulletin Conference has built a reputation as a conference that produces solid content. Some take this to mean that we are…
-
VB2018 paper: Internet balkanization: why are we raising borders online?
Sir Tim Berners-Lee, inventor of the world wide web, said “I hope we use the Net to cross barriers and connect cultures”. Yet increasingly we are seeing barriers being raised not only in the real world, but on the Internet as well. The Great Firewall of China is widely known, but the Chinese goverment is…
-
VB2018 paper: Internet balkanization: why are we raising borders online?
Sir Tim Berners-Lee, inventor of the world wide web, said “I hope we use the Net to cross barriers and connect cultures”. Yet increasingly we are seeing barriers being raised not only in the real world, but on the Internet as well. The Great Firewall of China is widely known, but the Chinese goverment is…
-
The malspam security products miss: banking and email phishing, Emotet and Bushaloader
This blog post was put together in collaboration with VB test engineers Adrian Luca and Ionuţ Răileanu. Virus Bulletin uses email feeds provided by Abusix and Project Honey Pot . This year, Virus Bulletin ‘s VBSpam test lab turns ten years old. Just as malicious and unwanted emails have evolved over the years, so has…
-
The malspam security products miss: banking and email phishing, Emotet and Bushaloader
This blog post was put together in collaboration with VB test engineers Adrian Luca and Ionuţ Răileanu. Virus Bulletin uses email feeds provided by Abusix and Project Honey Pot . This year, Virus Bulletin ‘s VBSpam test lab turns ten years old. Just as malicious and unwanted emails have evolved over the years, so has…
-
VB2018 paper: Where have all the good hires gone?
We often hear about the cybersecurity skills gap being ” an issue for all “, creating ” recuitment chaos “, an ” industry crisis “, and indeed the difficulties organizations encounter in hiring information security professionals have been described as one of the biggest challenges IT leaders face today. There is no doubt that such…
Got any book recommendations?