Tag: vb2016
-
VB2016 paper: Wild Android collusions
Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…
-
VB2016 paper: Wild Android collusions
Playing out in the sidelines of the Cambridge Analytica scandal was the discovery that Facebook had been collecting metadata on the calls and SMS conversations of many of the users of its Android app. Whatever your view on this practice, the fact that it is carried out by a single app does at least make…
-
Throwback Thursday: BGP – from route hijacking to RPKI: how vulnerable is the Internet?
Yesterday, a ‘ mysterious event ‘ involving BGP, the Internet’s border gateway protocol, led to the traffic to many popular websites being routed for around six minutes. BGP hijacks – the Internet equivalent of changing traffic direction signs – are not very common but occur more often than one would expect for a technology that is…
-
Throwback Thursday: BGP – from route hijacking to RPKI: how vulnerable is the Internet?
Yesterday, a ‘ mysterious event ‘ involving BGP, the Internet’s border gateway protocol, led to the traffic to many popular websites being routed for around six minutes. BGP hijacks – the Internet equivalent of changing traffic direction signs – are not very common but occur more often than one would expect for a technology that is…
-
Throwback Thursday: Anti-malware testing undercover
The testing of security products has been a hotly debated topic in the industry for at least the past two decades. It was, for instance, the topic of a popular VB2017 paper by ESET ‘s David Harley and will be the main focus of next week’s AMTSO meeting in Beijing, which Virus Bulletin will attend.…
-
Throwback Thursday: Anti-malware testing undercover
The testing of security products has been a hotly debated topic in the industry for at least the past two decades. It was, for instance, the topic of a popular VB2017 paper by ESET ‘s David Harley and will be the main focus of next week’s AMTSO meeting in Beijing, which Virus Bulletin will attend.…
-
Throwback Thursday: The beginning of the end(point): where we are now and where we’ll be in five years
Over the coming weeks and months, we plan to use the Throwback Thursday slot to look back at and publish some great VB conference presentations from our archives. We start this week by publishing the recording of a VB2016 presentation by Adrian Sanabria, then at 451 Research , who gave a thought-provoking talk on the…
-
Throwback Thursday: The beginning of the end(point): where we are now and where we’ll be in five years
Over the coming weeks and months, we plan to use the Throwback Thursday slot to look back at and publish some great VB conference presentations from our archives. We start this week by publishing the recording of a VB2016 presentation by Adrian Sanabria, then at 451 Research , who gave a thought-provoking talk on the…
-
VB2017 preview: Android reverse engineering tools: not the usual suspects
Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…
-
VB2017 preview: Android reverse engineering tools: not the usual suspects
Six years ago (coincidentally the last time the VB conference was held in Spain) saw the first VB conference paper presented on Android malware, which at that time was still an esoteric and mostly theoretical threat. Things have changed a lot in the last six years – something that is perhaps best illustrated by Google ‘s…