Tag: video
-
VB2017 paper: Android reverse engineering tools: not the usual suspects
Within a few years, Android malware has grown from a relatively small threat – the first VB conference talk on Android , in 2011, mentioned fewer than 100 malware families – to a huge problem involving more than three million new malware samples a year. The subject has been a regular one on the VB conference programme,…
-
VB2017 video: The state of cybersecurity in Africa: Kenya
IT security, or the lack thereof, affects Internet users around the world, and though many of the issues we face are global, there is a noticeable difference in the threats faced in various countries and regions, as well as in the ways they are dealt with. It is thus no coincidence that we strive to…
-
VB2017 video: The state of cybersecurity in Africa: Kenya
IT security, or the lack thereof, affects Internet users around the world, and though many of the issues we face are global, there is a noticeable difference in the threats faced in various countries and regions, as well as in the ways they are dealt with. It is thus no coincidence that we strive to…
-
VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle
Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers’ attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client. In a VB2016 last-minute presentation, ESET researchers…
-
VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle
Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers’ attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client. In a VB2016 last-minute presentation, ESET researchers…
-
VB2016 paper: One-Click Fileless Infection
Over the last few years, we have seen a sharp increase in ‘fileless’ infections, where a machine is compromised without a malicious file ever being written to disk. Though not impossible to detect and prevent, they do require a security product. In a paper entitled “One-click fileless infection” presented at VB2016 in Denver, Symantec researchers…
-
VB2016 paper: One-Click Fileless Infection
Over the last few years, we have seen a sharp increase in ‘fileless’ infections, where a machine is compromised without a malicious file ever being written to disk. Though not impossible to detect and prevent, they do require a security product. In a paper entitled “One-click fileless infection” presented at VB2016 in Denver, Symantec researchers…
-
VB2016 video: Neverquest: Crime as a Service and On the Hunt for the Big Bucks
Earlier this month, Spanish police officers arrested a Russian national on suspicion of creating the Neverquest banking trojan. Neverquest, also known as Vawtrak, is one of the most prevalent banking trojans of the moment, so while the arrest might not have a significant impact on cybercrime overall, it is good news: it sends the important message…