Filename Size VB 1991 Jersey/1991-conferencereport.pdf 1.5 MB VB 1991 Jersey/img001_595.jpg 107.7 KB VB 1991 Jersey/img002_595.jpg 113.4 KB VB 1991 Jersey/img003_595.jpg 123.3 KB VB 1992 Edinburgh/VB92report.pdf 2.3 MB VB 1993 Amsterdam/img001_595.jpg 146.5 KB VB 1993 Amsterdam/img002_595.jpg 159.4 KB VB 1993 Amsterdam/img003_595.jpg 165 KB VB 1993 Amsterdam/img004_595.jpg 166.1 KB VB 1993 Amsterdam/img005_595.jpg 139 KB VB 1993 Amsterdam/img006_595.jpg 157.8 KB VB 1993 Amsterdam/img007_595.jpg 149.8 KB VB 1993 Amsterdam/img008_595.jpg 152.4 KB VB 1993 Amsterdam/VB93report.pdf 2 MB VB 2007 Vienna/A different look at the VB2007 Conference in Vienna !.mp4 13.3 MB VB 2008 Ottawa/Interview with John Hawes of Virus Bulletin.mp4 4.5 MB VB 2008 Ottawa/Security experts answer key questions at Virus Bulletin 2008.mp4 3.6 MB VB 2009 Geneva/The Virus Bulletin yodelling competition.mp4 1.8 MB VB 2010 Vancouver/Costin Raiu on Virus Bulletin 2010.mp4 9.1 MB VB 2010 Vancouver/Stuxnet demo in Virus Bulletin 2010 conference.mp4 3.5 MB VB 2010 Vancouver/VB2010 Social Network and Computer Security Panel Discussion.mp4 24.2 MB VB 2012 Dallas/Flashback OS X malware - VB2012 presentation by Broderick Aquilino (F-Secure).mp4 19.2 MB VB 2012 Dallas/Virus Bulletin 2012 Conference Overview.mp4 22.8 MB VB 2013 Berlin/An automatic analysis and detection tool for Java exploits.mp4 19.4 MB VB 2013 Berlin/Analysis of Android in-app advertisement kits.mp4 34 MB VB 2013 Berlin/Back channels and bitcoins ZeroAccess' secret C&C communications.mp4 22.5 MB VB 2013 Berlin/Hacking Team and Gamma International in 'business-to-government malware'.mp4 25.6 MB VB 2013 Berlin/How to test properly comparative web filter tests.mp4 23.7 MB VB 2013 Berlin/Hypervisor-based, hardware-assisted system monitoring.mp4 23.8 MB VB 2013 Berlin/PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file).mp4 24.9 MB VB 2013 Berlin/Statistically effective protection against APT attacks.mp4 42.6 MB VB 2013 Berlin/Surviving 0-days - reducing the window of exposure.mp4 28.6 MB VB 2013 Berlin/VB2013 Keynote Ethics and the AV industry in the age of WikiLeaks.mp4 55 MB VB 2014 Seattle/.NET malware dynamic instrumentation for automated and manual analysis.mp4 27.7 MB VB 2014 Seattle/An in-depth analysis of abuse on Twitter.mp4 27.1 MB VB 2014 Seattle/Android packer facing the challenges, building solutions.mp4 28.2 MB VB 2014 Seattle/Attack points in health apps & wearable devices - how safe is your quantified self.mp4 38.3 MB VB 2014 Seattle/Attack surface analysis of Tizen devices.mp4 23.8 MB VB 2014 Seattle/Back in BlackEnergy 2014 targeted attacks in the Ukraine and Poland.mp4 22.8 MB VB 2014 Seattle/Bootkits past, present & future.mp4 32 MB VB 2014 Seattle/Caphaw - the advanced persistent pluginer.mp4 24.4 MB VB 2014 Seattle/Design to discover security analytics with 3D visualization engine.mp4 42.8 MB VB 2014 Seattle/DMARC - how to use it to improve your email reputation.mp4 17 MB VB 2014 Seattle/DNSSEC - how far have we come.mp4 23.7 MB VB 2014 Seattle/Duping the machine - malware strategies, post sandbox detection.mp4 23.5 MB VB 2014 Seattle/Early launch Android malware your phone is 0wned (demo).mp4 2.1 MB VB 2014 Seattle/Early launch Android malware your phone is 0wned.mp4 1.2 MB VB 2014 Seattle/Hiding the network behind the network. Botnet proxy business model.mp4 21.1 MB VB 2014 Seattle/Labelling spam through the analysis of protocol patterns.mp4 25.9 MB VB 2014 Seattle/Leaving our ZIP undone how to abuse ZIP to deliver malware apps.avi 40.2 MB VB 2014 Seattle/Methods of malware persistence on Mac OS X.avi 45.7 MB VB 2014 Seattle/OPSEC for security researchers.avi 95.9 MB VB 2014 Seattle/Optimized mal-ops. Hack the ad network like a boss.avi 41 MB VB 2014 Seattle/P0wned by a barcode stealing money from offline users.avi 78.2 MB VB 2014 Seattle/Presentation of the 1st Peter Szor Award.avi 13.6 MB VB 2014 Seattle/Protecting financial institutions from banking malware's man-in-the-browser attacks.avi 58.5 MB VB 2014 Seattle/Quantifying maliciousness in Alexa top-ranked domains.avi 48.7 MB VB 2014 Seattle/Smart home appliance security & malware.avi 88.4 MB VB 2014 Seattle/Sweeping the IP space the hunt for evil on the Internet.avi 45.7 MB VB 2014 Seattle/Swipe away, we're watching you.avi 65.4 MB VB 2014 Seattle/The evolution of webinjects.avi 44.8 MB VB 2014 Seattle/Unveiling the kernel rootkit discovery using selective automated kernel memory differencing.avi 52.8 MB VB 2014 Seattle/We know it before you do predicting malicious domains.avi 41.1 MB VB 2014 Seattle/Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists.avi 35.6 MB VB 2015 Prague/A quantitative examination of the current state of corporate security practices.avi 56.1 MB VB 2015 Prague/Android ransomware turning CryptoLocker into CryptoUnlocker.avi 52.6 MB VB 2015 Prague/Anonymity is king.avi 66.6 MB VB 2015 Prague/Attack on the drones security vulnerabilities of unmanned aerial vehicles.avi 62 MB VB 2015 Prague/Breaking the bank(er) automated configuration data extraction for banking malware.avi 68.4 MB VB 2015 Prague/Building a malware lab in the age of Big Data.avi 65.3 MB VB 2015 Prague/C&C-as-a-Service abusing third-party web services as C&C channels.avi 53.9 MB VB 2015 Prague/Can we trust a trustee An in-depth look into the digitally signed malware industry.avi 44.6 MB VB 2015 Prague/Dare 'DEVIL' beyond your senses with Dex Visualizer.avi 63.8 MB VB 2015 Prague/DDoS trojan a malicious concept that conquered the ELF format.avi 62.6 MB VB 2015 Prague/Dead and buried in their crypts defeating modern ransomware.avi 64.9 MB VB 2015 Prague/Digital 'Bian Lian' (face changing) the skeleton key malware.avi 69 MB VB 2015 Prague/Does prevalence matter Ranking anti-malware products by potential victim impact.avi 65.1 MB VB 2015 Prague/Doing more with less a study of file-less infection attacks.avi 62.1 MB VB 2015 Prague/Economic sanctions on malware.avi 91 MB VB 2015 Prague/Effectively testing APT defences.avi 56.4 MB VB 2015 Prague/Evolution of Android exploits from a static analysis tools perspective.avi 44 MB VB 2015 Prague/From Asia with love Smartphones with pre-installed malware.avi 70.8 MB VB 2015 Prague/How they're getting the data out of your network.avi 22.7 MB VB 2015 Prague/It has a EULA, it must be legit.avi 37.3 MB VB 2015 Prague/It's a file infector... it's ransomware... it's Virlock.avi 54.9 MB VB 2015 Prague/Keynote address One man's anti-malware researcher is....avi 96.2 MB VB 2015 Prague/Labeless - no more.avi 45.1 MB VB 2015 Prague/Last-minute paper Operation Potao Express analysis of a cyber-espionage toolkit.avi 63.9 MB VB 2015 Prague/Last-minute paper The mysterious case of Linux.Wifatch.avi 72.8 MB VB 2015 Prague/Linux Moose endangered or extinct An update on this atypical embedded Linux botnet.avi 57.9 MB VB 2015 Prague/Making a dent in Russian mobile banking phishing.avi 54.4 MB VB 2015 Prague/Mobile banking fraud via SMS in North America who's doing it and how.avi 67.2 MB VB 2015 Prague/Modelling the network behaviour of malware to block malicious patterns.avi 69.5 MB VB 2015 Prague/Notes on click fraud American story.avi 41.3 MB VB 2015 Prague/POS fraud - trends and counter-actions to mass fraud.avi 67.7 MB VB 2015 Prague/ROSCO Repository Of Signed COde.avi 75.7 MB VB 2015 Prague/Sizing cybercrime incidents and accidents, hints and allegations.avi 62.2 MB VB 2015 Prague/Solving the (in)security of home networked devices.avi 63.9 MB VB 2015 Prague/Speaking Dyreza protocol. Advantages of 'learning' a new language.avi 59.3 MB