Cambridge professor to deliver VB2015 keynote.
Yesterday, the British Computer Society (BCS) announced that the 2015 Lovelace Medal has been awarded to Prof. Ross Anderson.
Named after and in honour of Ada Lovelace (1815-1852), who is often credited as being the first computer programmer, the Lovelace Medal is awarded to "individuals who have made an outstanding contribution to the understanding or advancement of computing". Previous winners include Linux creator Linus Torvalds and World Wide Web inventor Tim Berners-Lee.
Users do choose weak passwords, but they aren't as big a problem as we think.
This week, I spent a few days at the Cyber Security Summit Financial Services conference in Prague, discussing the state of security with people who work in the financial sector.
Unsurprisingly, a common topic of discussion was that group of individuals who cause headaches for all security engineers: users. They show a surprising inventiveness when it comes to doing things wrong and are often willing to go so far as to take a photograph of their list of TAN codes to help crooks circumvent two-factor authentication. On top of that, they have a tendency to choose very weak passwords.
VB gets in on the Throwback Thursday act, delving into the archives.
Over the last couple of years, the 'Throwback Thursday' trend has taken the Internet by storm, with social media users indulging in a weekly wallow in nostalgia, fondly resurrecting photographs of themselves wearing terrible fashion in their childhood or sporting awful haircuts in their teens. The VB team decided it was high time we got in on the act, but to spare you the photographs (for now at least), we plan to use the opportunity to take a regular delve into our archives.
This week, we turn back the clock to December 1996 at a time when the memory limits of the DOS environment posed issues for anti-malware developers that we wouldn't give a second thought to today. While scanners were already "groaning" under the load of the ever-increasing number of viruses (the growth in the number of known viruses was then around 150-200 per month), the need to add complex new scan capabilities - for dealing with macro viruses - threatened to be the last straw for some. The solution for several products of the time was to supply a second executable offering macro-scanning functionality. The then Editor of VB, Ian Whalley, quite rightly argued that it was unreasonable to expect people to have to run multiple programs to detect different types of virus and wondered where we would be if we had to have a product consisting of 9,500 separate executables, "one for every virus...".
Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.
Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added 'Swipe away, we're watching you' by Fortinet researchers Hong Kei Chan and Liang Huang.
Point-of-Sale (PoS) malware was a little known threat until late 2013. Since then, a large number of US chain stores have suffered data breaches via their payment terminals.