This Throwback Thursday, we turn the clock back to February 2004 when Stuart Taylor wondered whether there was truly a criminal element entering virus writing.
These days, no one would argue that there wasn't a criminal element in virus writing — cybercrime is big business and has evolved into a truly organized crime ecosystem. On browsing back through the VB archives, we were surprised to find almost the exact point at which the anti-virus community realised that virus writing was starting to veer away from the realms of the annoying and bothersome script kiddies and becoming a far more serious and sinister occupation.
Use your steganography-detection skills and win a pile of books.
The puzzle can be played by anyone, but if you are attending VB2015, you can win seven books on computer security. The winner will be the person who finds the greatest number of URLs or, if people find an equal number of URLs, the person who does so in the shortest time.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
With VB2015, the 25th Virus Bulletin International Conference, just days away, we decided to take a look back at the first ever VB Conference: VB'91 in Jersey.
Next week, we expect somewhere in the region of 470 delegates from some 44 different countries to descend on the city of Prague for the 25th Virus Bulletin Conference. Back in 1991, it was a more modest 150 delegates and 20 speakers from four continents that descended on the Hotel de France in Jersey — modest, but a respectable turnout for the inaugural event.
VB2015 presentation to include demonstration of technique against recent samples.
'The scary hack that's on the rise' is how Wired's Kim Zetter described ransomware in an overview article posted yesterday. Indeed, encrypting your files and demanding a ransom to decrypt them has become a very lucrative cybercriminal enterprise.
Of course, the best defence against ransomware is to make regular backups that are stored separately from the original device. But can security software perhaps play a role too and prevent ransomware from running in the first place?