Mindblown: a blog about philosophy.

  • Malware authors’ continued use of stolen certificates isn’t all bad news

    A malware campaign has been using code-signing certificates stolen from Taiwanese companies to sign its samples, ESET researcher and regular VB conference speaker Anton Cherepanov writes . Malware signed with stolen certificates isn’t a new phenomenon. Stuxnet famously used stolen certificates, also from Taiwanese companies, and in 2016 Symantec wrote about a malware campaign that…

  • Save the dates: VB2019 to take place 2-4 October 2019

    While we hope that you have already circled the dates of 3-5 October 2018 in your agendas, and that you will join us and security experts from around the world for VB2018 in Montreal, Canada ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your…

  • Necurs update reminds us that the botnet cannot be ignored

    If, at some point in the past few years, you have looked at a spam campaign in which a lot of emails were being sent from Vietnam or India, there’s a good chance the spam was sent by the Necurs botnet. Necurs has been active for at least six years – Virus Bulletin published a…

  • Save the dates: VB2019 to take place 2-4 October 2019

    While we hope that you have already circled the dates of 3-5 October 2018 in your agendas, and that you will join us and security experts from around the world for VB2018 in Montreal, Canada ( book your ticket now , before it’s too late!), we wanted to share another set of dates for your…

  • Necurs update reminds us that the botnet cannot be ignored

    If, at some point in the past few years, you have looked at a spam campaign in which a lot of emails were being sent from Vietnam or India, there’s a good chance the spam was sent by the Necurs botnet. Necurs has been active for at least six years – Virus Bulletin published a…

  • Nominations opened for fifth Péter Szőr Award

    Virus Bulletin is seeking nominations for the fifth annual Péter Szőr Award. The award was inaugurated during the VB2014 conference, in honour of late security researcher and malware expert Péter Szőr, who passed away in November 2013. It is given to for the best piece of technical security research published during the preceding year; for…

  • .SettingContent-ms files remind us that it is features, not bugs we should be most concerned about

    One of the most significant developments in the threat landscape in recent years has been the return of malicious Office macros, their resurgence having started four years ago . Unlike their predecessors from the 1990s, these macros can’t run automatically, but require the user to explicitly enable macros. This obviously mitigates the damage quite a…

  • Nominations opened for fifth Péter Szőr Award

    Virus Bulletin is seeking nominations for the fifth annual Péter Szőr Award. The award was inaugurated during the VB2014 conference, in honour of late security researcher and malware expert Péter Szőr, who passed away in November 2013. It is given to for the best piece of technical security research published during the preceding year; for…

  • .SettingContent-ms files remind us that it is features, not bugs we should be most concerned about

    One of the most significant developments in the threat landscape in recent years has been the return of malicious Office macros, their resurgence having started four years ago . Unlike their predecessors from the 1990s, these macros can’t run automatically, but require the user to explicitly enable macros. This obviously mitigates the damage quite a…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

Got any book recommendations?