Mindblown: a blog about philosophy.

  • Book review: Click Here to Kill Everybody

    Paul Baccas reviews ‘Click here to Kill Everybody’ by Bruce Schneier Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Author: Bruce Schneier Publisher: W. W. Norton & Company ISBN: 978-0393608885 The great and memorable title of Bruce Schneier’s latest book, ‘Click Here to Kill Everybody’, certainly caught the eye of…

  • Spam is mostly noise and that makes measuring it very difficult

    A recent blog post published by Recorded Future looked at the possible effect of the GDPR on the volume of spam and concludes there has been no noticeable impact. The question behind the post is a valid one: more privacy-friendly WHOIS records, inspired by the EU’s data protection regulation, could make it easier for spammers…

  • Spam is mostly noise and that makes measuring it very difficult

    A recent blog post published by Recorded Future looked at the possible effect of the GDPR on the volume of spam and concludes there has been no noticeable impact. The question behind the post is a valid one: more privacy-friendly WHOIS records, inspired by the EU’s data protection regulation, could make it easier for spammers…

  • Virus Bulletin announces programme of the first International Threat Intelligence Summit

    Today, we are excited to announce the programme of the first International Threat Intelligence Summit, which will form an integral part of the VB2018 conference programme. Most of the people attending Virus Bulletin conferences work in roles that involve threat intelligence, whether it is to generate such data, to share with others, or to use…

  • Virus Bulletin announces programme of the first International Threat Intelligence Summit

    Today, we are excited to announce the programme of the first International Threat Intelligence Summit, which will form an integral part of the VB2018 conference programme. Most of the people attending Virus Bulletin conferences work in roles that involve threat intelligence, whether it is to generate such data, to share with others, or to use…

  • VB2018 preview: Explain Ethereum smart contract hacking like I am five

    Shout ‘blockchain’ in a group of security experts and everyone will start to laugh. It is fair to say that the security community tends to be rather sceptical about cryptocurrencies and blockchains and the promises that come with them. But it is easy to forget that many well-meaning people invest real money in these technologies.…

  • VB2018 preview: Explain Ethereum smart contract hacking like I am five

    Shout ‘blockchain’ in a group of security experts and everyone will start to laugh. It is fair to say that the security community tends to be rather sceptical about cryptocurrencies and blockchains and the promises that come with them. But it is easy to forget that many well-meaning people invest real money in these technologies.…

  • VB2017 video: Client Maximus raises the bar

    Brazil has long been known as a hotbed of cybercrime, but what makes the country especially unique is that a lot of this cybercrime is inwards-focused. Thus there are many malware strains written explicitly to target the country. One of them is Client Maximus, a banking trojan discovered in 2017 by researchers from IBM Trusteer…

  • VB2017 video: Client Maximus raises the bar

    Brazil has long been known as a hotbed of cybercrime, but what makes the country especially unique is that a lot of this cybercrime is inwards-focused. Thus there are many malware strains written explicitly to target the country. One of them is Client Maximus, a banking trojan discovered in 2017 by researchers from IBM Trusteer…

  • The security industry is genuinely willing to help you do good work

    An article at Cyberscoop lists security companies that are offering assistance to protect election systems, for example by protecting against DDoS attacks, performing penetration testing or providing anti-virus software, for free or at a significant discount. The list, which isn’t complete (for example Google also offers free DDoS protection for election systems), is topical given…

Got any book recommendations?