Mindblown: a blog about philosophy.

  • Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe

    In the run up to VB2016 , we invited the conference sponsors to write guest posts for our blog. In the first of this series, ESET writes about the SBDH toolkit. Over the course of the last year, ESET has detected and analysed several instances of malware used for targeted espionage – dubbed the SBDH…

  • Avast acquires AVG for $1.3bn

    There was interesting news in the anti-virus world yesterday, as Avast announced the acquisition of its competitor AVG . Both companies were founded in the Czech Republic and both are best known for their free home anti-virus products. Indeed, it is not uncommon for people to confuse the two companies. Writing on his company’s blog,…

  • Avast acquires AVG for $1.3bn

    There was interesting news in the anti-virus world yesterday, as Avast announced the acquisition of its competitor AVG . Both companies were founded in the Czech Republic and both are best known for their free home anti-virus products. Indeed, it is not uncommon for people to confuse the two companies. Writing on his company’s blog,…

  • Throwback Thursday: You Are the Weakest Link, Goodbye!

    A recent survey by mobile ID provider TeleSign revealed that 72% of security professionals believe that passwords will be phased out by 2025 – in favour of behavioural biometrics and two-factor authentication. Passwords have long been a weak point in the security chain, despite efforts to encourage users to pick strong ones. 13 years ago,…

  • Throwback Thursday: You Are the Weakest Link, Goodbye!

    A recent survey by mobile ID provider TeleSign revealed that 72% of security professionals believe that passwords will be phased out by 2025 – in favour of behavioural biometrics and two-factor authentication. Passwords have long been a weak point in the security chain, despite efforts to encourage users to pick strong ones. 13 years ago,…

  • Paper: New Keylogger on the Block

    Keyloggers have long been a popular tool for cybercriminals, something made worse by the fact that many of them are sold commercially. Today, we publish a paper ( here as a PDF) by Sophos researcher Gabor Szappanos, in which he studies the ‘KeyBase’ keylogger. Though the product has officially been discontinued, allegedly because of abuse…

  • Paper: New Keylogger on the Block

    Keyloggers have long been a popular tool for cybercriminals, something made worse by the fact that many of them are sold commercially. Today, we publish a paper ( here as a PDF) by Sophos researcher Gabor Szappanos, in which he studies the ‘KeyBase’ keylogger. Though the product has officially been discontinued, allegedly because of abuse…

  • BSides Denver to take place the day after VB2016

    VB2016 , the 26th International Virus Bulletin conference, is an excellent reason to visit Denver, Colorado in the first week of October this year. Of course, we are biased, but a look at the packed programme will hopefully convince you too. There is another reason to come to Denver this October though: BSides Denver will…

  • BSides Denver to take place the day after VB2016

    VB2016 , the 26th International Virus Bulletin conference, is an excellent reason to visit Denver, Colorado in the first week of October this year. Of course, we are biased, but a look at the packed programme will hopefully convince you too. There is another reason to come to Denver this October though: BSides Denver will…

  • VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format

    Recently, a new trend has emerged in non- Windows DDoS attacks. Malware has evolved into complex and relatively sophisticated pieces of code, employing compression, advanced encryption and even rootkit capabilities. Machines running systems supporting the ELF format are targeted – meaning that anything from desktops and servers to IoT devices such as routers or digital…

Got any book recommendations?