Tag: conference

  • Call for Papers: VB2015 Prague

    VB seeks submissions for the 25th Virus Bulletin Conference. Virus Bulletin is seeking submissions from those wishing to present papers at VB2015 , which will take place 30 September to 2 October 2015 at the Clarion Congress Hotel in Prague, Czech Republic. Originally started as an annual gathering of anti-virus experts, the VB conference has…

  • Virus Bulletin announces platinum sponsors for VB2015

    More sponsorship opportunities available. While the opening of VB2015 in Prague is still more than nine months away, we have already started with the preparations for what will be the 25th Virus Bulletin conference. And we’re not the only ones looking forward to the conference: several companies have already been eager to associate themselves with…

  • Botconf 2014 preview

    Many VB authors and presenters to speak at second botnet-fighting conference. Last year, I attended the first edition of ‘ Botconf ‘ in the French city of Nantes. I really enjoyed the conference, so I am looking forward to the second edition , which will take place in less than two weeks’ time in Nancy,…

  • VB2014 paper: Optimized mal-ops. Hack the ad network like a boss

    Why buying ad space makes perfect sense for those wanting to spread malware. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Optimized mal-ops. Hack the ad network like a boss’ by Bromium researchers Vadim Kotov and Rahul Kashyap. Malicious…

  • VB2014 Paper: Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the Bitcoin bonanza in the digital era

    Santiago Pontiroli takes us on a rollercoaster ride through cryptocurrency land. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital…

  • VB2014 paper: Hiding the network behind the network. Botnet proxy business model

    Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Hiding the network behind the network. Botnet proxy business model’ by Bitdefender researchers Alexandru Maximciuc, Razvan Benchea and…

  • VB2014 paper: Methods of malware persistence on Mac OS X

    ‘KnockKnock’ tool made available to the public. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Methods of malware persistence on Mac OS X’ by Synack researcher Patrick Wardle. It has been a while since Apple used the scarcity of…

  • VB2014 paper: Exposing Android white collar criminals

    Luis Corrons dives into the world of shady Android apps. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Exposing Android white collar criminals’ by Panda Security researcher Luis Corrons. Android is by far the most popular operating system when…

  • Black Hat Europe – day 2

    IPv6 versus IDPS, XSS in WYSIWYG editors, and reflected file downloads. After a busy first day , I was somewhat glad that the talks on the second day of Black Hat Europe appealed slightly less to my personal tastes and interests, as this gave me a chance to meet some old and new friends, and…

  • Black Hat Europe – day 1

    Programme packed with interesting talks. Though the prestige of Black Hat Europe doesn’t compare to that of its American parent conference, and the event certainly doesn’t dominate the debate on Twitter in quite the same way, more than 800 security experts descended on Amsterdam this week where, in the RAI Convention Centre, the 14th edition…