Mindblown: a blog about philosophy.

  • Nominations opened for fourth Péter Szőr Award

    Virus Bulletin is seeking nominations for the fourth annual Péter Szőr Award . The award was inaugurated during the VB2014 conference, in honour of late security researcher and malware expert Péter Szőr , who passed away in November 2013. It is given to for the best piece of technical security research published during the preceding year;…

  • VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks

    In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…

  • VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks

    In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…

  • Security advice in the wake of WannaCry and Not(Petya)

    The recent outbreaks of WannaCry and (Not)Petya have left many users and organizations understandably confused about what to do and how to fend off such attacks. Thankfully, security experts are always happy to give advice. I decided to collect together and compile a list of the most important, and most frequently given, advice. Always install…

  • Security advice in the wake of WannaCry and Not(Petya)

    The recent outbreaks of WannaCry and (Not)Petya have left many users and organizations understandably confused about what to do and how to fend off such attacks. Thankfully, security experts are always happy to give advice. I decided to collect together and compile a list of the most important, and most frequently given, advice. Always install…

  • 48 hours after initial reports, many mysteries remain around the latest ransomware/wiper threat

    “What’s in a name? that which we call a rose By any other name would smell as sweet” Shakespeare’s philosophising can equally be applied to malware, and whether you call it Petya, NotPetya, Nyetya or Petna, the latest piece of malware to hit the headlines is just as damaging. The name isn’t the only thing…

  • 48 hours after initial reports, many mysteries remain around the latest ransomware/wiper threat

    “What’s in a name? that which we call a rose By any other name would smell as sweet” Shakespeare’s philosophising can equally be applied to malware, and whether you call it Petya, NotPetya, Nyetya or Petna, the latest piece of malware to hit the headlines is just as damaging. The name isn’t the only thing…

  • VB2017 Early Bird discount to expire this week

    “Hundreds of businesses, both large and small, have suffered from the handiwork of the virus writers. It is now clear that a sabotage mentality exists and new computer viruses destroy data and programs – the more extreme examples being programmed to format hard-disks.” Aside from a few technical details, this could have been written today. It…

  • VB2017 Early Bird discount to expire this week

    “Hundreds of businesses, both large and small, have suffered from the handiwork of the virus writers. It is now clear that a sabotage mentality exists and new computer viruses destroy data and programs – the more extreme examples being programmed to format hard-disks.” Aside from a few technical details, this could have been written today. It…

  • VB2016 paper: Steam stealers: it’s all fun and games until someone’s account gets hijacked

    The online games market is huge, and the Steam platform is a huge player in that market. Users registered on the Steam platform use their credit cards to buy content, and willingly provide personal information to and exchange items with other network participants. Rather unsurprisingly, this has not gone unnoticed by cybercriminals, and a while…

Got any book recommendations?