Tag: vb2014
-
VB2014 paper: Labelling spam through the analysis of protocol patterns
What do your IP packet sizes say about whether you’re a spammer? Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Labelling spam through the analysis of protocol patterns’ by Bitdefender researchers Andrei Husanu and Alexandru Trifan. Machines sending spam…
-
VB2014 paper: Sweeping the IP space: the hunt for evil on the Internet
Dhia Mahjoub explains how the topology of the AS graph can be used to uncover hotspots of maliciousness. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Sweeping the IP space: the hunt for evil on the Internet’ by OpenDNS…
-
VB2014 paper: Optimized mal-ops. Hack the ad network like a boss
Why buying ad space makes perfect sense for those wanting to spread malware. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Optimized mal-ops. Hack the ad network like a boss’ by Bromium researchers Vadim Kotov and Rahul Kashyap. Malicious…
-
VB2014 paper: Apple without a shell – iOS under targeted attack
Developer Enterprise Program recently found to be used by WireLurker. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Apple without a shell – iOS under targeted attack’, by FireEye researchers Tao Wei, Min Zheng, Hui Xue and Dawn Song.…
-
VB2014 video: Attack points in health apps & wearable devices – how safe is your quantified self?
Health apps and wearable devices found to make many basic security mistakes. “I know a lot of you have a Fitbit device.” The geeks attending VB conferences tend to like their gadgets, and many of them have the latest ones, so the claim made by Candid Wüest at the beginning of his VB2014 last-minute presentation…
-
VB2014 paper: DMARC – how to use it to improve your email reputation
Terry Zink presents case study in which he describes setting a DMARC policy for Microsoft. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘DMARC – how to use it to improve your email reputation’, by Microsoft’s Terry Zink. Email…
-
VB2014 Paper: Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the Bitcoin bonanza in the digital era
Santiago Pontiroli takes us on a rollercoaster ride through cryptocurrency land. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists, a quick overview of the bitcoin bonanza in the digital…
-
The VB2014 presentation you never saw. Early launch Android malware: your phone is 0wned
Malicious apps may have more privileges than security software. There are many people without whom a Virus Bulletin conference wouldn’t be possible: the VB team, the crew from Cue Media , the hotel staff, the speakers, the sponsors , the delegates. But the unsung heroes of a conference are the reserve speakers. They prepare a…
-
VB2014 paper: Hiding the network behind the network. Botnet proxy business model
Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Hiding the network behind the network. Botnet proxy business model’ by Bitdefender researchers Alexandru Maximciuc, Razvan Benchea and…
-
VB2014 paper: Methods of malware persistence on Mac OS X
‘KnockKnock’ tool made available to the public. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Methods of malware persistence on Mac OS X’ by Synack researcher Patrick Wardle. It has been a while since Apple used the scarcity of…