Tag: vb2018

  • VB2018 preview: Explain Ethereum smart contract hacking like I am five

    Shout ‘blockchain’ in a group of security experts and everyone will start to laugh. It is fair to say that the security community tends to be rather sceptical about cryptocurrencies and blockchains and the promises that come with them. But it is easy to forget that many well-meaning people invest real money in these technologies.…

  • VB2018 preview: Explain Ethereum smart contract hacking like I am five

    Shout ‘blockchain’ in a group of security experts and everyone will start to laugh. It is fair to say that the security community tends to be rather sceptical about cryptocurrencies and blockchains and the promises that come with them. But it is easy to forget that many well-meaning people invest real money in these technologies.…

  • VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

    Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have grown enormously, and every VB conference since has featured several talks on Android malware. VB2018 is no exception. One of this year’s Android talks…

  • VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

    Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have grown enormously, and every VB conference since has featured several talks on Android malware. VB2018 is no exception. One of this year’s Android talks…

  • VB2018 preview: From drive-by download to drive-by mining

    “Understanding the new paradigm”, Malwarebytes researcher Jérôme Segura writes in the title of his upcoming VB2018 presentation on drive-by mining. He could hardly have put it more accurately – the rise of malicious cryptocurrency miners is the main security trend of the past 12 months. In the paper , Jérôme will look at those miners that…

  • VB2018 preview: From drive-by download to drive-by mining

    “Understanding the new paradigm”, Malwarebytes researcher Jérôme Segura writes in the title of his upcoming VB2018 presentation on drive-by mining. He could hardly have put it more accurately – the rise of malicious cryptocurrency miners is the main security trend of the past 12 months. In the paper , Jérôme will look at those miners that…

  • Red Eyes threat group targets North Korean defectors

    AhnLab has published a research paper that looks at the Red Eyes group, which is particularly active against North Korean defectors, as well as journalists and human rights activists in the North Korean community. The paper ( pdf ) is written by Minseok (Jacky) Cha and was originally published in Korean in April of this…

  • Red Eyes threat group targets North Korean defectors

    AhnLab has published a research paper that looks at the Red Eyes group, which is particularly active against North Korean defectors, as well as journalists and human rights activists in the North Korean community. The paper ( pdf ) is written by Minseok (Jacky) Cha and was originally published in Korean in April of this…

  • VB announces Threat Intelligence Summit to take place during VB2018

    The very first edition of Virus Bulletin magazine, published in July 1989, contained lists of “[all] known IBM PC viruses” and “[all] known Apple Macintosh viruses”. In the pre-web days, people really did have to rely on a printed magazine to update them on the latest threats, and thus Virus Bulletin was one of the…

  • VB announces Threat Intelligence Summit to take place during VB2018

    The very first edition of Virus Bulletin magazine, published in July 1989, contained lists of “[all] known IBM PC viruses” and “[all] known Apple Macintosh viruses”. In the pre-web days, people really did have to rely on a printed magazine to update them on the latest threats, and thus Virus Bulletin was one of the…