Mindblown: a blog about philosophy.

  • Throwback Thursday: Michelangelo – Graffiti Not Art

    This week marked the 25th anniversary of the Michelangelo virus. The boot sector virus was designed to trigger on 6 March 1992, on which date it would override all of the data on the infected machine’s hard drive. The Michelangelo virus – which was so named by researchers for the fact that 6 March was also the…

  • How are you defending your network? Come and tell us at VB2017!

    Last night, this Tweet caught my attention: The majority of “security research” presented at conferences is really vulnerability research. Far too few new ideas about securing systems. — [email protected] (@nxsolle) March 7, 2017 Now I, like most security professionals, love a good presentation on a new vulnerability. They tend to be funny, intriguing and more…

  • Quick impressions from BSides Budapest

    At Virus Bulletin, we love the BSides concept and we have attended several of the BSides events around the world. So when Peter Karsai , who is soon to join the VB team, offered to write something about his experience at BSides Budapest, we jumped at the chance to publish his post. Growing up in…

  • How are you defending your network? Come and tell us at VB2017!

    Last night, this Tweet caught my attention: The majority of “security research” presented at conferences is really vulnerability research. Far too few new ideas about securing systems. — [email protected] (@nxsolle) March 7, 2017 Now I, like most security professionals, love a good presentation on a new vulnerability. They tend to be funny, intriguing and more…

  • Quick impressions from BSides Budapest

    At Virus Bulletin, we love the BSides concept and we have attended several of the BSides events around the world. So when Peter Karsai , who is soon to join the VB team, offered to write something about his experience at BSides Budapest, we jumped at the chance to publish his post. Growing up in…

  • First sponsors of VB2017 announced

    We are proud of the fact that the Virus Bulletin Conference is one of the industry’s most international security conferences, with speakers and attendees coming together from all over the world to discuss the latest security threats, as well as what can be done to mitigate them. The international element also generally holds true for…

  • First sponsors of VB2017 announced

    We are proud of the fact that the Virus Bulletin Conference is one of the industry’s most international security conferences, with speakers and attendees coming together from all over the world to discuss the latest security threats, as well as what can be done to mitigate them. The international element also generally holds true for…

  • Security products and HTTPS: let’s do it better

    It is one of the most hotly discussed topics in the security community: is it acceptable for a security product to intercept encrypted HTTP communication (HTTPS) to analyse its content? First, those who are against the practice point out that it breaks the end-to-end principle of HTTPS. This is obviously true, but misses an important…

  • Security products and HTTPS: let’s do it better

    It is one of the most hotly discussed topics in the security community: is it acceptable for a security product to intercept encrypted HTTP communication (HTTPS) to analyse its content? First, those who are against the practice point out that it breaks the end-to-end principle of HTTPS. This is obviously true, but misses an important…

  • The SHA-1 hashing algorithm has been ‘shattered’

    Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…

Got any book recommendations?