Tag: vb2014

  • VB2014 paper: P0wned by a barcode: stealing money from offline users

    Fabio Assolini explains how cybercriminals are targeting boletos. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘P0wned by a barcode: stealing money from offline users’ by Kaspersky Lab researcher Fabio Assolini. If you…

  • VB2014 paper: We know it before you do: predicting malicious domains

    Wei Xu and his colleagues attempt to block domains before they’re used for bad purposes. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘We know it before you do: predicting malicious domains’ by…

  • VB2014 paper: Ubiquitous Flash, ubiquitous exploits and ubiquitous mitigation

    Chun Feng and Elia Florio analyse two Flash Player vulnerabilities and an IE one where Flash provides a helping hand. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Ubiquitous Flash, ubiquitous exploits and…

  • VB2014 paper: Design to discover: security analytics with 3D visualization engine

    Thibault Reuille and Dhia Mahjoub use DNS data to look for clusters of malicious domains. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Design to discover: security analytics with 3D visualization engine’ by…

  • VB2014 paper: OPSEC for security researchers

    Vicente Diaz teaches researchers the basics of OPSEC. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘OPSEC for security researchers’ by Kaspersky researchers Vicente Diaz and Dani Creus. As long as you perform…

  • VB2014 paper: Duping the machine – malware strategies, post sandbox detection

    James Wyke looks at malware that takes extra steps to frustrate researchers. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Duping the machine – malware strategies, post sandbox detection’ by Sophos researcher James…

  • VB2014 Paper: Attack surface analysis of Tizen devices

    Irfan Asrar looks at the security of the operating system used in many IoT devices. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Attack surface analysis of Tizen devices’ by Irfan Asrar, a…

  • VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

    Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘ Unveiling the kernel: rootkit discovery using selective…

  • VB2014 paper: Smart home appliance security and malware

    Jeongwook Oh demonstrates how to hack a Samsung smart TV. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Smart home appliance security and malware’, by HP researcher Jeongwook Oh. The (in)security of the Internet of Things (IoT) is a…

  • Conference report: VB2014

    The biggest and broadest ranging Virus Bulletin conference ever was a great success. There is a Dutch expression that says that you shouldn’t trust a butcher who judges his own meat. Perhaps then, when the Virus Bulletin Editor says that the Virus Bulletin conference was really good, you should take these words with a pinch…