Test your technical and mental limits in the VB2017 foosball tournament

Posted by   Martijn Grooten on   Sep 22, 2017

We all know the scenario. You're using multiple layers of defence, combined with a fast response time, to prevent a skilled attacker from reaching the goal. Or maybe you are that attacker, and you are carefully looking for that single weakness that will allow you to bypass the defence.

I am, of course, talking about foosball (or table football), a game surprisingly popular within the security community. For more than a decade, a foosball tournament has taken place in the sidelines of the VB conference, and this year is no different.

foosball.jpg

It's serious business — the competition follows the official International Table Soccer Federation rules — but teams of beginners and more experienced players alike are encouraged to join the tournament which, as every year, will be hosted by G Data in the VB2017 exhibition area in the breaks between conference sessions.

You will find more details on the dedicated page. And if you want to join, why not use Twitter to look for teammates?

All team members must be registered VB2017 delegates, so if you haven't done so already, book your conference place now (not only to participate in the foosball tournament but also to hear more than 50 top security experts discuss the latest threats and strategies to fight them)!

VB2017-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.