Mindblown: a blog about philosophy.

  • VB2017 paper: Exploring the virtual worlds of advergaming

    At VB2016 in Denver, Malwarebytes researchers Jérôme Segura and Chris Boyd presented a paper on malicious advertising, or malvertising. At the end of the paper, as they looked at the future of online ads, they discussed new trends in ‘advergaming’, or in-game ads. This subject was the topic of a follow-up paper , presented by…

  • Netflix issue shows email verification really does matter

    In the email security community, the use of confirmed opt-in has long been a recommended practice: an email address given to you can’t be used until the account owner has confirmed (by clicking a link in or replying to a confirmation email) that they do indeed own that email address. When email service provider Mailchimp…

  • VB2017 paper: Exploring the virtual worlds of advergaming

    At VB2016 in Denver, Malwarebytes researchers Jérôme Segura and Chris Boyd presented a paper on malicious advertising, or malvertising. At the end of the paper, as they looked at the future of online ads, they discussed new trends in ‘advergaming’, or in-game ads. This subject was the topic of a follow-up paper , presented by…

  • New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach

    Yesterday, we published a paper (that was presented at VB2016) on Android app collusions : the situation in which two or more apps work together to exfiltrate data from a device using the combined permissions of each app. Today, we publish a follow-up paper by the same (in fact, slightly larger) group of researchers, affiliated…

  • New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach

    Yesterday, we published a paper (that was presented at VB2016) on Android app collusions : the situation in which two or more apps work together to exfiltrate data from a device using the combined permissions of each app. Today, we publish a follow-up paper by the same (in fact, slightly larger) group of researchers, affiliated…

  • VB2016 paper: Wild Android collusions

    Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…

  • VB2016 paper: Wild Android collusions

    Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…

  • VB2017 paper: The life story of an IPT – Inept Persistent Threat actor

    Last Wednesday, Belgium-based Polish hacker Thomasz T. was arrested during a visit to his home country. Thomasz is believed to be the author of the Polski, Vortex, and Flotera ransomware families. Though this may look impressive on one’s cybercrime CV, it turns out that Thomasz may not be the most skilled of hackers. At VB2017…

  • VB2017 paper: The life story of an IPT – Inept Persistent Threat actor

    Last Wednesday, Belgium-based Polish hacker Thomasz T. was arrested during a visit to his home country. Thomasz is believed to be the author of the Polski, Vortex, and Flotera ransomware families. Though this may look impressive on one’s cybercrime CV, it turns out that Thomasz may not be the most skilled of hackers. At VB2017…

  • Five reasons to submit a VB2018 paper this weekend

    The call for papers for VB2018 will close this Sunday, 18 March (in fact, to ensure we cover the entirety of the deadline day across all time zones, we’ll close submissions first thing on Monday morning, European time). We’ve already received many great submissions, but more are always welcome. The VB2017 speakers all look like…

Got any book recommendations?