Tag: vb2016

  • VB2016: Important Information About the Hotel

    We are delighted that many people have already registered for VB2016, and registration for VB2016 will remain open right up until the start of the conference. However, the large number of registrations does mean that, for the moment, the conference hotel is fully booked for accommodation (sold out) on Friday 7 October. Of course, the…

  • VB2016: Important Information About the Hotel

    We are delighted that many people have already registered for VB2016, and registration for VB2016 will remain open right up until the start of the conference. However, the large number of registrations does mean that, for the moment, the conference hotel is fully booked for accommodation (sold out) on Friday 7 October. Of course, the…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…

  • A look at the VB2016 sponsors

    Today, we are exactly one month away from the start of VB2016 , the 26th Virus Bulletin International Conference, which is to take place 5-7 October in Denver, Colorado. We thought this was a good moment to highlight the sponsors of the conference. We are excited to be sponsored by such a broad range of…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…

  • VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

    The recent discovery of a one-million-device IoT botnet used for DDoS attacks should be ample proof that concerns over the security of the Internet of Things are not merely theoretical. Unfortunately, the use of specific components and the wide variety among them makes reverse engineering such devices rather complicated. But it doesn’t need to be,…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…

  • VB2016 preview: Wild Android Collusions

    Most research into and protection against malicious apps focuses on single apps. This makes it interesting for malware authors to use app ‘collusion’: the ability of two (or more) apps to perform an attack in collaboration. Such attacks have previously been demonstrated as proof-of-concepts but had not yet been found in the wild until earlier…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…