Tag: conference

  • VB2017: nine last-minute papers announced

    At Virus Bulletin we try not to follow the daily security hype, focusing instead on the bigger trends. This means that the topics covered on the VB2017 conference programme – the majority of which was published in April – are still as relevant now as they were five months ago. Still, security is constantly evolving, and…

  • VB2017 preview: State of cybersecurity in Africa: Kenya

    The Internet is very much a global phenomenon, and for that reason, so is cybersecurity. A remote code execution vulnerability is as much of a problem on a server in Afghanistan as it is on one in Zimbabwe. Yet threats do vary between countries and regions, and in order to get a complete picture of…

  • VB2017 preview: State of cybersecurity in Africa: Kenya

    The Internet is very much a global phenomenon, and for that reason, so is cybersecurity. A remote code execution vulnerability is as much of a problem on a server in Afghanistan as it is on one in Zimbabwe. Yet threats do vary between countries and regions, and in order to get a complete picture of…

  • VB2017 preview: Calling all PUA fighters

    While a lot of attention is focused on the fight against advanced malware, a different kind of threat is providing just as big a headache for security companies: that of apps (often free ones) whose behaviours sit right on the limits of what is acceptable from a security point of view. The “better safe than…

  • VB2017 preview: Calling all PUA fighters

    While a lot of attention is focused on the fight against advanced malware, a different kind of threat is providing just as big a headache for security companies: that of apps (often free ones) whose behaviours sit right on the limits of what is acceptable from a security point of view. The “better safe than…

  • VB2017 preview: From insider threat to insider asset: a practical guide

    “How to catch a Snowden” was the slogan branded across an exhibition booth at the recent Infosecurity Europe event by an exhibitor apparently offering a solution to insider threats. Whether you think it appropriate to use the NSA whistle-blower as an example, insider threats are real, and the concern organizations have – both about employees whose…

  • VB2017 preview: From insider threat to insider asset: a practical guide

    “How to catch a Snowden” was the slogan branded across an exhibition booth at the recent Infosecurity Europe event by an exhibitor apparently offering a solution to insider threats. Whether you think it appropriate to use the NSA whistle-blower as an example, insider threats are real, and the concern organizations have – both about employees whose…

  • VB2017 preview: Your role in child abuse

    When previewing VB conference talks, I often get excited about presentations that are to showcase clever attacks and brilliant techniques to fight them. About Mick Moran’s VB2017 presentation though, rather than feeling excited, I feel uncomfortable. It is, however, one of the most important talks ever to have been presented at a Virus Bulletin conference,…

  • VB2017 preview: Your role in child abuse

    When previewing VB conference talks, I often get excited about presentations that are to showcase clever attacks and brilliant techniques to fight them. About Mick Moran’s VB2017 presentation though, rather than feeling excited, I feel uncomfortable. It is, however, one of the most important talks ever to have been presented at a Virus Bulletin conference,…

  • VB2017 preview: Mariachis and jackpotting: ATM malware from Latin America

    A few years ago, I saw an ATM being opened for the first time. “Hold on,” I thought, “this is really just a Windows XP PC!” Suddenly, I realised that, to attack an ATM, cybercriminals wouldn’t need to write anything like Stuxnet-level malware. Indeed, ATM malware has been on the rise, particularly in Latin America,…