Tag: conference

  • VB2014 paper: Swipe away, we’re watching you

    Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Swipe away, we’re watching you’ by Fortinet researchers Hong…

  • VB2015 conference programme announced

    From drones to elephants: an exciting range of topics will be covered in Prague. In six months’ time, security researchers from around the world will gather in Prague for the 25th Virus Bulletin conference. Today we are excited to reveal the conference programme. As every year, the selection committee’s task was very difficult with some…

  • Virus Bulletin seeks hackers, network researchers for VB2015

    One week left to submit an abstract for the 25th Virus Bulletin conference. A few weeks ago, I made a short visit to the Clarion Congress Hotel in Prague, where VB2015 will take place this September/October. Seeing the hotel has made me even more excited about the conference and the various ‘enhancements’ we plan to…

  • VB2014 paper: P0wned by a barcode: stealing money from offline users

    Fabio Assolini explains how cybercriminals are targeting boletos. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘P0wned by a barcode: stealing money from offline users’ by Kaspersky Lab researcher Fabio Assolini. If you…

  • Frequently asked questions about VB2015 conference submissions

    No, it doesn’t have to be about malware and no, it doesn’t have to be deeply technical either! Last month, we opened the call for papers for VB2015 , the 25th Virus Bulletin conference, which takes place 30 September to 2 October in Prague, Czech Republic. We’ve had some excellent presentations at the VB conference…

  • VB2014 paper: Ubiquitous Flash, ubiquitous exploits and ubiquitous mitigation

    Chun Feng and Elia Florio analyse two Flash Player vulnerabilities and an IE one where Flash provides a helping hand. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Ubiquitous Flash, ubiquitous exploits and…

  • VB2014 paper: OPSEC for security researchers

    Vicente Diaz teaches researchers the basics of OPSEC. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘OPSEC for security researchers’ by Kaspersky researchers Vicente Diaz and Dani Creus. As long as you perform…

  • VB2014 paper: Duping the machine – malware strategies, post sandbox detection

    James Wyke looks at malware that takes extra steps to frustrate researchers. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Duping the machine – malware strategies, post sandbox detection’ by Sophos researcher James…

  • VB2014 Paper: Attack surface analysis of Tizen devices

    Irfan Asrar looks at the security of the operating system used in many IoT devices. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Attack surface analysis of Tizen devices’ by Irfan Asrar, a…

  • Conference review: Botconf 2014

    Second edition of ‘botnet fighting conference’ another great success. I had been looking forward to the second edition of the Botconf conference ever since I came back from the first one last year, and being given a speakers’ slot was the icing on the cake. The conference, which saw 200 security researchers travel to Nancy,…