Tag: vb2016

  • BSides Denver: Join and Support the Security Community

    I sometimes catch myself talking about “the security industry” and then quickly correct myself to say “the security community”. For, despite the presence of big businesses and lots of money, there remains a strong community feeling in the world of security. This is certainly true for the VB conference, which despite having grown over the…

  • VB2016 ‘Last-Minute’ Papers Announced

    With a little over three weeks to go until VB2016 , the conference programme is almost complete. We have a great selection of talks on the main programme, half a dozen Small Talks that we hope will lead to interesting discussions among participants, and a closing keynote from Morgan Marquis-Boire , the hacker, security researcher…

  • BSides Denver: Join and Support the Security Community

    I sometimes catch myself talking about “the security industry” and then quickly correct myself to say “the security community”. For, despite the presence of big businesses and lots of money, there remains a strong community feeling in the world of security. This is certainly true for the VB conference, which despite having grown over the…

  • VB2016 ‘Last-Minute’ Papers Announced

    With a little over three weeks to go until VB2016 , the conference programme is almost complete. We have a great selection of talks on the main programme, half a dozen Small Talks that we hope will lead to interesting discussions among participants, and a closing keynote from Morgan Marquis-Boire , the hacker, security researcher…

  • VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

    Although some inventive (and often quite impractical) non-network-based ways to remotely control malware have been presented, most botnets use the normal Internet connection of the infected device to send information and receive commands. This inherent weakness in botnets’ infrastructures makes command and control traffic a useful avenue for analysing botnet behaviour. Haka is an open…

  • VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

    Although some inventive (and often quite impractical) non-network-based ways to remotely control malware have been presented, most botnets use the normal Internet connection of the infected device to send information and receive commands. This inherent weakness in botnets’ infrastructures makes command and control traffic a useful avenue for analysing botnet behaviour. Haka is an open…

  • VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

    If you are wondering whether you really live in the future: we need to be concerned about the security of Internet-connected power outlets. Such devices are the subject of a VB2016 paper by four researchers from Bitdefender in Romania: George Cabău, Radu Basaraba, Dragoș Gavriluț and Ciprian Oprișa. While the devices may not appear to…

  • VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

    If you are wondering whether you really live in the future: we need to be concerned about the security of Internet-connected power outlets. Such devices are the subject of a VB2016 paper by four researchers from Bitdefender in Romania: George Cabău, Radu Basaraba, Dragoș Gavriluț and Ciprian Oprișa. While the devices may not appear to…

  • VB2016 preview: Uncovering the Secrets of Malvertising

    Two years ago, at VB2014, Bromium researcher Vadim Kotov presented a paper in which he looked at various possibilities for cybercriminals to leverage ad networks to spread malware. Unfortunately, if somewhat unsurprisingly, Vadim’s predictions came true and ‘malvertising’ has become a huge plague on the Internet in the two years since his talk. Despite this…

  • VB2016 preview: Uncovering the Secrets of Malvertising

    Two years ago, at VB2014, Bromium researcher Vadim Kotov presented a paper in which he looked at various possibilities for cybercriminals to leverage ad networks to spread malware. Unfortunately, if somewhat unsurprisingly, Vadim’s predictions came true and ‘malvertising’ has become a huge plague on the Internet in the two years since his talk. Despite this…