Mindblown: a blog about philosophy.

  • VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle

    Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers’ attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client. In a VB2016 last-minute presentation, ESET researchers…

  • Consumer spyware: a serious threat with a different threat model

    We all know the risks of having a device infected with malware: an anonymous adversary far away can encrypt your files and hold them to ransom; they can steal your personal data and sell it online; or they can steal your money directly from your online financial services. But imagine if the adversary is neither…

  • Consumer spyware: a serious threat with a different threat model

    We all know the risks of having a device infected with malware: an anonymous adversary far away can encrypt your files and hold them to ransom; they can steal your personal data and sell it online; or they can steal your money directly from your online financial services. But imagine if the adversary is neither…

  • VB2016 paper: Debugging and monitoring malware network activities with Haka

    Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…

  • VB2016 paper: Debugging and monitoring malware network activities with Haka

    Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…

  • VB2017: a wide ranging and international conference programme

    Packets don’t do borders, which makes computer security a very global problem and one that can only be tackled if we work together. For 26 years, the Virus Bulletin conference has been bringing together people from all over the world. Today, we are proud to present the very international programme of VB2017, the 27th Virus…

  • VB2017: a wide ranging and international conference programme

    Packets don’t do borders, which makes computer security a very global problem and one that can only be tackled if we work together. For 26 years, the Virus Bulletin conference has been bringing together people from all over the world. Today, we are proud to present the very international programme of VB2017, the 27th Virus…

  • John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017

    Later this week, we’ll be announcing the programme for VB2017 , the 27th Virus Bulletin International Conference – a programme that we think is the best yet, and about which we are very excited. To give you just a sneak preview, we are thrilled to be able to announce today that the opening and closing…

  • John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017

    Later this week, we’ll be announcing the programme for VB2017 , the 27th Virus Bulletin International Conference – a programme that we think is the best yet, and about which we are very excited. To give you just a sneak preview, we are thrilled to be able to announce today that the opening and closing…

  • Virus Bulletin says a fond farewell to John Hawes

    Ten years ago, when I joined the very small Virus Bulletin team, the risk of computer viruses accidentally spreading to millions of PCs was still considered very real. Hence my colleague John Hawes, who tested products’ detection of such viruses, worked in a sealed-off room elsewhere in the building, without an Internet connection, and behind…

Got any book recommendations?