Mindblown: a blog about philosophy.
-
VB2017 preview: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server
Apart from the odd taxi driver loudly making the claim, the idea that “Macs don’t get malware” has become something of the past. Nevertheless, most security researchers focus on Windows (and increasingly Android ) malware, thus making malware that targets macOS still the odd one out. Someone who for years has focused almost exclusively on…
-
VB2017 – information for press
Next week, security researchers from around the world will gather in Madrid for VB2017 , the 27th International Virus Bulletin Conference. More than 50 security industry experts will present conference papers to their peers, to help with research in the fight against the various digital threats we all face. This is, and has always been,…
-
VB2017 – information for press
Next week, security researchers from around the world will gather in Madrid for VB2017 , the 27th International Virus Bulletin Conference. More than 50 security industry experts will present conference papers to their peers, to help with research in the fight against the various digital threats we all face. This is, and has always been,…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
Test your technical and mental limits in the VB2017 foosball tournament
We all know the scenario. You’re using multiple layers of defence, combined with a fast response time, to prevent a skilled attacker from reaching the goal. Or maybe you are that attacker, and you are carefully looking for that single weakness that will allow you to bypass the defence. I am, of course, talking about…
-
Test your technical and mental limits in the VB2017 foosball tournament
We all know the scenario. You’re using multiple layers of defence, combined with a fast response time, to prevent a skilled attacker from reaching the goal. Or maybe you are that attacker, and you are carefully looking for that single weakness that will allow you to bypass the defence. I am, of course, talking about…
-
Hot FinSpy research completes VB2017 programme
The infamous FinSpy (or FinFisher) government spyware has managed to keep a low profile in recent years, though its use of two Microsoft zero-days ( CVE-2017-0199 and CVE-2017-8759 ) this year shows that it is still active. Today, researchers from ESET have published new research which points to the spyware using a different infection method:…
Got any book recommendations?