Tag: vb2014

  • VB2014: frequently asked questions

    Some useful information for those attending VB2014 – or those interested in attending. I haven’t registered yet, but I’d like to attend. Can I still register? Yes, you can. Use our online registration form or contact [email protected] . Does the hotel still have rooms available? Attendance numbers this year are higher than ever before, so…

  • VB2014 preview: keynote and closing panel

    Vulnerability disclosure one of the hottest issues in security. In the proceedings of the 24th Virus Bulletin conference , the words ‘vulnerabilty’ and ‘vulnerabilities’ occur more than 200 times. I think there is no better way to demonstrate how important a topic this is. Some approach vulnerabilities from a purely defensive point of view: how…

  • VB2014 preview: Apple without a shell – iOS under targeted attack

    FireEye researchers show a large attack vector for Apple’s mobile operating system. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, we look at the paper ‘ Apple without a shell – iOS under targeted…

  • VB2014 preview: The three levels of exploit testing

    Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, we look at the paper ‘ The…

  • VB2014 preview: last-minute papers added to the programme

    Hot topics to be covered at VB2014 conference in Seattle. Although most of the VB2014 conference programme was announced back in April, it looks anything but dated. A paper on malicious ads became even more hot when java.com was found to serve such ads, while the recent data breach at Home Depot increased the relevance…

  • VB2014 preview: Swipe away, we’re watching you

    Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, we look at the paper ‘ Swipe away, we’re watching…

  • VB2014 preview: Design to discover: security analytics with 3D visualization engine

    Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Design to discover: security analytics with…

  • VB2014 preview: Methods of malware persistence on Mac OS X

    Patrick Wardle shows that OS X users really have something to worry about. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Methods of malware persistence on Mac OS…

  • VB2014 preview: Duping the machine – malware strategies, post sandbox detection

    James Wyke looks at four difference decoy methods. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Duping the machine – malware strategies, post sandbox detection ‘, from Sophos…

  • VB2014 preview: Labelling spam through the analysis of protocol patterns

    Andrei Husanu and Alexandru Trifan look at what TCP packet sizes can teach us. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Labelling spam through the analysis of…