Mindblown: a blog about philosophy.
-
Throwback Thursday: The malware battle: reflections and forecasts
“Another year has come to its end and the malware battle still rages on. It seems to be a never-ending uphill struggle to secure digital information.” This could have been written just weeks ago, but in fact comes from an article written 13 years ago, in which Jamz Yaneza reflected on the year just ended and…
-
Throwback Thursday: The malware battle: reflections and forecasts
“Another year has come to its end and the malware battle still rages on. It seems to be a never-ending uphill struggle to secure digital information.” This could have been written just weeks ago, but in fact comes from an article written 13 years ago, in which Jamz Yaneza reflected on the year just ended and…
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
A Christmas present for the security community
A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…
-
A Christmas present for the security community
A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…
-
Paper: Spreading techniques used by malware
Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…
-
Paper: Spreading techniques used by malware
Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…
-
VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users
Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…
Got any book recommendations?