Tag: google
-
Free VB2019 tickets for students
Update 02 August 2019: Applications for free student tickets have now closed. Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android , we are able to offer 20 free tickets to students who want to attend VB2019 , the 29th Virus Bulletin Conference. The Virus Bulletin Conference is one of…
-
Free VB2019 tickets for students
Update 02 August 2019: Applications for free student tickets have now closed. Virus Bulletin is excited to announce that, thanks to generous sponsorship from Google Android , we are able to offer 20 free tickets to students who want to attend VB2019 , the 29th Virus Bulletin Conference. The Virus Bulletin Conference is one of…
-
VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library
Though still relatively new (the first VB conference paper on Android malware was presented in 2011), malware targeting the Android mobile operating system has evolved quickly, in terms of both quantity and quality. Many of the characteristics of desktop malware are now also seen in Android malware – for example, the use of anti-analysis techniques, and…
-
VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library
Though still relatively new (the first VB conference paper on Android malware was presented in 2011), malware targeting the Android mobile operating system has evolved quickly, in terms of both quantity and quality. Many of the characteristics of desktop malware are now also seen in Android malware – for example, the use of anti-analysis techniques, and…
-
VB2018 video: Triada: the past, the present and the (hopefully not existing) future
From NotPetya to Shadowpad, supply chain attacks have become a serious and hard-to-fight security problem. One prominent type of supply chain attack involves the pre-installation of malware on (often) cheap Android devices. At VB2018 in Montreal, Google researcher Łukasz Siewierski talked about one such case: that of the multi-purpose ‘Triada’ trojan. First discovered by Kaspersky…
-
VB2018 video: Triada: the past, the present and the (hopefully not existing) future
From NotPetya to Shadowpad, supply chain attacks have become a serious and hard-to-fight security problem. One prominent type of supply chain attack involves the pre-installation of malware on (often) cheap Android devices. At VB2018 in Montreal, Google researcher Łukasz Siewierski talked about one such case: that of the multi-purpose ‘Triada’ trojan. First discovered by Kaspersky…
-
VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library
Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have grown enormously, and every VB conference since has featured several talks on Android malware. VB2018 is no exception. One of this year’s Android talks…
-
VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library
Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have grown enormously, and every VB conference since has featured several talks on Android malware. VB2018 is no exception. One of this year’s Android talks…
-
Subtle change could see a reduction in installation of malicious Chrome extensions
As modern browsers have become harder to attack, malware authors have found a simple way around this: by working with the browser rather than against it. More particularly, by tricking users into installing extensions they host on official browser stores, like the Google Chrome Store . Malicious Chrome extensions have been used for various nefarious…
-
Subtle change could see a reduction in installation of malicious Chrome extensions
As modern browsers have become harder to attack, malware authors have found a simple way around this: by working with the browser rather than against it. More particularly, by tricking users into installing extensions they host on official browser stores, like the Google Chrome Store . Malicious Chrome extensions have been used for various nefarious…