Tag: cylance

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

    While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…