Mindblown: a blog about philosophy.
-
Throwback Thursday: Once a researcher…
VB was saddened to learn this week of the passing of one of the pioneers of the AV industry, Ross M. Greenberg. Ross Greenberg, author of Flushot, Virex PC, and telecommunications program RamNet UUCP: a man of diverse interests. Ross M. Greenberg was the author of Flushot , one of the world’s first anti-virus programs,…
-
The SHA-1 hashing algorithm has been ‘shattered’
Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…
-
Throwback Thursday: Once a researcher…
VB was saddened to learn this week of the passing of one of the pioneers of the AV industry, Ross M. Greenberg. Ross Greenberg, author of Flushot, Virex PC, and telecommunications program RamNet UUCP: a man of diverse interests. Ross M. Greenberg was the author of Flushot , one of the world’s first anti-virus programs,…
-
VB2017: What is happening in the threat landscape and what are we doing against it? Submit a proposal in the VB2017 CFP!
There are four weeks (minus one day) until the Call for Papers for VB2017 closes. The Virus Bulletin International Conference is one of the longest running and most prestigious security conferences in the world. It is also one of the most international, attracting speakers and attendees from all over the world. It is a place…
-
VB2017: What is happening in the threat landscape and what are we doing against it? Submit a proposal in the VB2017 CFP!
There are four weeks (minus one day) until the Call for Papers for VB2017 closes. The Virus Bulletin International Conference is one of the longest running and most prestigious security conferences in the world. It is also one of the most international, attracting speakers and attendees from all over the world. It is a place…
-
Security for your ears: recommended infosec podcasts
“Don’t waste your commute listening to pop music. Listen to infosec lectures and podcasts.” Industry veteran Mikko Hyppönen recently shared some useful advice for those wanting to start a career in cybersecurity. I fully agree with Mikko. In fact, I think this advice should be extended to anyone already working in cybersecurity – listening to podcasts…
-
Security for your ears: recommended infosec podcasts
“Don’t waste your commute listening to pop music. Listen to infosec lectures and podcasts.” Industry veteran Mikko Hyppönen recently shared some useful advice for those wanting to start a career in cybersecurity. I fully agree with Mikko. In fact, I think this advice should be extended to anyone already working in cybersecurity – listening to podcasts…
-
VB2016 video: Getting duped: piggybacking on webcam streams for surreptitious recordings
If you are going to be at RSA in San Francisco next week, we highly recommend you attend Patrick Wardle’s talk on OS X malware in 2016 – not just because it is important for Mac users to know that they too can fall victim to malware, but also because Patrick is an excellent speaker. We…
Got any book recommendations?