Mindblown: a blog about philosophy.

  • From HSBC to product descriptions: the malicious emails bypassing your filters

    Over a one-week period earlier this month, the average email with a malicious attachment was almost three times as likely to bypass email security products than a spam email without such an attachment. When it came to phishing emails ─ a category in which we include emails that link to malware ─ the situation was…

  • VB2018 paper: Inside Formbook infostealer

    The Formbook information-stealing trojan has been spread by a number of recent spam campaigns . The malware was advertised in hacking forums as long ago as January 2016, but wasn’t written about until an Arbor Networks blog post in September 2017. The malware is a ‘form-grabber’, which means it intercepts data entered in website forms,…

  • VB2018 paper: Inside Formbook infostealer

    The Formbook information-stealing trojan has been spread by a number of recent spam campaigns . The malware was advertised in hacking forums as long ago as January 2016, but wasn’t written about until an Arbor Networks blog post in September 2017. The malware is a ‘form-grabber’, which means it intercepts data entered in website forms,…

  • The VB2019 CFP – how the selection procedure works

    Last week, we opened the call for papers for VB2019 , which is to take place 2-4 October in London, UK. The deadline for the call for papers is Sunday 17 March . We are often asked how the selection procedure works, and since we believe transparency, and since an explanation of what we are…

  • The VB2019 CFP – how the selection procedure works

    Last week, we opened the call for papers for VB2019 , which is to take place 2-4 October in London, UK. The deadline for the call for papers is Sunday 17 March . We are often asked how the selection procedure works, and since we believe transparency, and since an explanation of what we are…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…

  • VB2018 paper: From Hacking Team to hacked team to…?

    It is good practice not to mock or laugh at hacking victims. But when the victim is a company that itself is in the business of hacking and has a habit of selling its products and services to governments with dubious human rights records, few could help but smile at the irony. This was the…

  • The spam that is hardest to block is often the most damaging

    This blog post was put together in collaboration with VB test engineers Adrian Luca and Ionuţ Răileanu. In a talk I gave at IRISSCON last year (the video of which you will find at the bottom of this post), I discussed how spam is a problem that has almost been solved (and certainly has been well…

  • Throwback Thursday: We’re all doomed

    When a daily sports paper compares a national soccer crisis with the spread of an Internet worm, you know that the worm has had an enormous impact on everyday life. This was the case with W32/Mydoom when it first made an appearance in early 2004. Incredibly, despite its advanced years, Mydoom is still showing up…

  • The spam that is hardest to block is often the most damaging

    This blog post was put together in collaboration with VB test engineers Adrian Luca and Ionuţ Răileanu. In a talk I gave at IRISSCON last year (the video of which you will find at the bottom of this post), I discussed how spam is a problem that has almost been solved (and certainly has been well…

Got any book recommendations?