Tag: conference

  • VB2018 preview: hacking cars

    In recent years, car hacking has evolved from a mostly theoretical research field involving giggling researchers and scared journalists , to one that actually concerns car owners and manufacturers. It is fitting, then, that at VB2018 next month, two papers will be presented on the subject of car hacking. Inbar Raz, Security Architect at Argus…

  • VB2018 preview: commercial spyware and its use by governments

    Yesterday, a new report by Citizen Lab looked at NSO Group ‘s Pegasus spyware and its global use. The report is worth a read, for the political implications of the findings, for the interesting methodology used, as well as for the section on the ethics of DNS cache probing. I have long been a fan…

  • VB2018 preview: commercial spyware and its use by governments

    Yesterday, a new report by Citizen Lab looked at NSO Group ‘s Pegasus spyware and its global use. The report is worth a read, for the political implications of the findings, for the interesting methodology used, as well as for the section on the ethics of DNS cache probing. I have long been a fan…

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018 preview: IoT botnets

    For a long time IoT-botnets were just one of those things security professionals warned about. Then, with the appearance of Mirai in 2016, they became a reality. Mirai’s success in performing DDoS attacks, combined with the leak of the botnet’s source code, has led to a great many descendants, some of which stay closer to…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2018: last-minute talks announced

    With a little over three weeks to go until the start of VB2018 , 28th Virus Bulletin Conference, we are excited to announce ten last-minute talks that cover hot research. Nation-state & cyber espionage attacks Nation-state attacks and cyber espionage continue to be hot topics in cybersecurity, and this is reflected in several last-minute papers.…

  • VB2018 preview: Since the hacking of Sony Pictures

    Yesterday, the US Justice Department brought charges against an alleged hacker for the North Korean government. The man, Park Jin Hyok, is accused of being connected with the 2014 Sony Pictures Entertainment hack, as well as the 2017 WannaCry worm and various hacks of banks through the SWIFT system. Though charges against individuals linked to…