Use your steganography-detection skills and win a pile of books.
The puzzle can be played by anyone, but if you are attending VB2015, you can win seven books on computer security. The winner will be the person who finds the greatest number of URLs or, if people find an equal number of URLs, the person who does so in the shortest time.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
With VB2015, the 25th Virus Bulletin International Conference, just days away, we decided to take a look back at the first ever VB Conference: VB'91 in Jersey.
Next week, we expect somewhere in the region of 470 delegates from some 44 different countries to descend on the city of Prague for the 25th Virus Bulletin Conference. Back in 1991, it was a more modest 150 delegates and 20 speakers from four continents that descended on the Hotel de France in Jersey — modest, but a respectable turnout for the inaugural event.
VB2015 presentation to include demonstration of technique against recent samples.
'The scary hack that's on the rise' is how Wired's Kim Zetter described ransomware in an overview article posted yesterday. Indeed, encrypting your files and demanding a ransom to decrypt them has become a very lucrative cybercriminal enterprise.
Of course, the best defence against ransomware is to make regular backups that are stored separately from the original device. But can security software perhaps play a role too and prevent ransomware from running in the first place?
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.
This week saw the confession of a former teenage virus writer: the author of the Leprosy and Leprosy.B viruses, which afflicted computer users in the early 90s, confessed all on The Register, saying "I just wanted to prove to the scenesters that even an idiot who didn't really know how to program could write a virus."
The confession got us looking back through the VB archives where we stumbled across an article from 1990, written by none other than VB director, Dr. Jan Hruska, in which he noted that, while it is not easy to establish the origins of a computer virus, and it is rare that positive indicators as to authorship can be found by examining virus code, there are (or were, at the time) a number of notable exceptions to this.