Tag: vb2014

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 2

    With an excellent conference programme featuring some of the top experts in the IT security industry and covering some of the most important topics, we have much to look forward to when it comes to VB2017 , the 27th Virus Bulletin conference. But we also often look back at past conference presentations, not just because…

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 2

    With an excellent conference programme featuring some of the top experts in the IT security industry and covering some of the most important topics, we have much to look forward to when it comes to VB2017 , the 27th Virus Bulletin conference. But we also often look back at past conference presentations, not just because…

  • VB2016 preview: Uncovering the Secrets of Malvertising

    Two years ago, at VB2014, Bromium researcher Vadim Kotov presented a paper in which he looked at various possibilities for cybercriminals to leverage ad networks to spread malware. Unfortunately, if somewhat unsurprisingly, Vadim’s predictions came true and ‘malvertising’ has become a huge plague on the Internet in the two years since his talk. Despite this…

  • VB2016 preview: Uncovering the Secrets of Malvertising

    Two years ago, at VB2014, Bromium researcher Vadim Kotov presented a paper in which he looked at various possibilities for cybercriminals to leverage ad networks to spread malware. Unfortunately, if somewhat unsurprisingly, Vadim’s predictions came true and ‘malvertising’ has become a huge plague on the Internet in the two years since his talk. Despite this…

  • More VB Conference papers and videos published

    11 papers and 9 videos added to our website. In the security industry, we’re used to people saying sorry: “sorry we chose a default password of 12345678”; “sorry we didn’t look after your personal data better”; “sorry we didn’t discover this huge vulnerability earlier”; and so on. In that context, my reason for apologising is…

  • VB2014 paper: Quantifying maliciousness in Alexa top-ranked domains

    Paul Royal looks at malware served through the most popular websites. Though VB2014 took place nine months ago, most of the papers presented during the conference remain very relevant. Paul Royal’s paper ‘Quantifying maliciousness in Alexa top-ranked domains’ is no exception. Large websites serving malware through direct compromises or through compromises of the ad networks…

  • VB2014 paper: Swipe away, we’re watching you

    Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Swipe away, we’re watching you’ by Fortinet researchers Hong…

  • VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps

    Gregory Panakkal explains that there are different ways of looking at APK files – and that sometimes that can have unintended consequences. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Leaving our ZIP…

  • VB2014 paper: Caphaw – the advanced persistent pluginer

    Micky Pun and Neo Tan analyse the banking trojan that is best known for spreading through Skype. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Caphaw – the advanced persistent pluginer’ by Fortinet…

  • VB2014 video: .NET malware dynamic instrumentation for automated and manual analysis

    Hexiang Hu used tool to detect Bladabindi backdoor. The .NET framework is a popular way to write software. As applications built with the framework compile into a Common Intermediate Language (CIL), single binaries can run on multiple platforms and CPU architectures. However, as is so often the case, what is useful for authors of benign…