Tag: conference
-
Test your technical and mental limits in the VB2017 foosball tournament
We all know the scenario. You’re using multiple layers of defence, combined with a fast response time, to prevent a skilled attacker from reaching the goal. Or maybe you are that attacker, and you are carefully looking for that single weakness that will allow you to bypass the defence. I am, of course, talking about…
-
VB2017 preview: Android reverse engineering tools: not the usual suspects
Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…
-
VB2017 preview: Android reverse engineering tools: not the usual suspects
Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…
-
VB2017 preview: Crypton – exposing malware’s deepest secrets
Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…
-
VB2017 preview: Crypton – exposing malware’s deepest secrets
Ask a programmer to perform the same task twice and they will write a tool that automates it. Malware analysts are no different, and the Virus Bulletin Conference has a long history of including papers on tools and tricks that make the task of analysing malware a lot easier. ‘Crypton’ is such a tool. It…
-
VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats
In March this year, following a political row between the Netherlands and Turkey, a large number of Dutch websites were defaced to display messages in support of the Turkish government. It was another example in a growing trend of socio-political motivated attackers defacing websites, or performing other kinds of hacks, to spread their message. For…
-
VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats
In March this year, following a political row between the Netherlands and Turkey, a large number of Dutch websites were defaced to display messages in support of the Turkish government. It was another example in a growing trend of socio-political motivated attackers defacing websites, or performing other kinds of hacks, to spread their message. For…
-
VB2017: WHOIS and EICAR Small Talks added
In addition to the nine ‘last-minute’ papers that were announced and added to the VB2017 programme yesterday, we have also added two more ‘Small Talks’. The ‘Small Talks’ take place in a smaller room (hence the name) and last longer than regular VB2017 talks, thus giving a more informal atmosphere to allow for discussion and…
-
VB2017: WHOIS and EICAR Small Talks added
In addition to the nine ‘last-minute’ papers that were announced and added to the VB2017 programme yesterday, we have also added two more ‘Small Talks’. The ‘Small Talks’ take place in a smaller room (hence the name) and last longer than regular VB2017 talks, thus giving a more informal atmosphere to allow for discussion and…
-
VB2017: nine last-minute papers announced
At Virus Bulletin we try not to follow the daily security hype, focusing instead on the bigger trends. This means that the topics covered on the VB2017 conference programme – the majority of which was published in April – are still as relevant now as they were five months ago. Still, security is constantly evolving, and…