VB seeks submissions for the 26th Virus Bulletin Conference.
Sebastian Porst explains what Google has done to protect users from phishing apps targeting Russian banks.
Third botnet fighting conference another big success.
US presidential candidates regularly see their emails blocked by spam filters.
This Throwback Thursday, VB heads back to 1997 with 'A View from the Lab'.
Brian Wallace presents tool to optimize ssDeep comparisons.
This Throwback Thursday, we turn the clock back to November 2003, when spam was such a hot topic that VB decided to launch a dedicated 'VB Spam Supplement'.
Aditya K. Sood and Rohit Bansal highlight a different side of an exploit kit.
This Throwback Thursday, we turn the clock back to March 2000, when DDoS attacks were a newly emerging menace.
In his VB2015 keynote address, Ross Anderson described attacks against EMV cards.
This Throwback Thursday, we turn the clock back ten years, when the discovery of a rootkit ignited a firestorm of criticism for Sony.
All participating full solutions earn VBSpam certification, while little delay is observed in spam filters.
Thorough analysis of this new kid on the malware block.
Great research presented in a stimulating environment.
This Throwback Thursday, we turn the clock back to July 2002, when virus hoaxes were wreaking havoc in homes and organizations worldwide.
This Throwback Thursday, we turn the clock back to February 2004 when, in order to get a gauge of the "real" virus problem, Jim Bates presented the findings of a survey of UK computer programmers.
Gabor Szappanos looks at how macro malware campaigns spread a commercial keylogger to harvest banking details.
This Throwback Thursday, we turn the clock back to February 2004 when Stuart Taylor wondered whether there was truly a criminal element entering virus writing.
Use your steganography-detection skills and win a pile of books.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
VB2015 presentation to include demonstration of technique against recent samples.
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.
Ten talks covering hot research added to the VB2015 programme.
Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder.
This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses.
Last-minute papers, steganography competition and foosball tournament.
This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough.
Raul Alvarez performs low-level analysis of information-stealing trojan.
Several conference papers to deal with targeted attacks.
This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity and volume of viruses was proving a headache.
Szilard Stange makes the case for multi-engine malware scanning.
Products defy prediction of tougher circumstances.
Malware authors upped their game following 2014 disruption of No-IP.
This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost?
Experts to cover various aspects of IoT (in)security in a range of talks.
David Harley responds to anti-malware's many criticasters.
Both Windows and Linux users actively being targeted.
This Throwback Thursday, we turn the clock back to July 2000, when concerns were growing about malicious threats to the Palm Personal Digital Assistant.
Support scammers not lying about a malware infection for a change.
This Throwback Thursday, we turn the clock back to January 1994, shortly after Cyber Riot had emerged as the first virus capable of infecting the Windows kernel.
The operating system has been patched, but it is unclear whether users will receive those patches.
This Throwback Thursday, we turn the clock back to 1993, when VB asked the key question: could a virus compromise safety at one of Britain's nuclear power plants?
Ten speaking slots waiting to be filled with presentations on 'hot' security topics.
Decline not necessarily good news for spam filters.
No good reason to continue using the stream cipher, yet attacks remain impractical.
This Throwback Thursday, we turn the clock back to 1996, when VB looked at what was available to protect your computer free of charge.
Meng Su explains how Dridex works and how it communicates with its C&C server.
Hacking Team leakers should have taken a leaf out of Snowden's book.
This Throwback Thursday, we turn the clock back to 2004, when the first worm to spread from mobile phone to mobile phone appeared.
Lists of customers, source code and zero-day vulnerabilities made public.
This Throwback Thursday, we turn the clock back to 1997, when automatic updates of AV software were not the norm.
'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.
Paul Royal looks at malware served through the most popular websites.
Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award.
This Throwback Thursday, we turn the clock back to 1994, when KAOS4 was discovered on the Internet.
Tool to extract identifiers incorporated into VirusTotal.
Use your obfuscation and deobfuscation skills to win a prize during the VB2015 conference!
Agencies looked for vulnerabilities to exploit and for submitted malware samples.
Exploit kit currently being tested focuses primarily on Flash Player exploits.
This Throwback Thursday, we turn the clock back to 1999, when Melissa was causing havoc across the globe and VB presented a series of articles detailing all you ever wanted to know about macro viruses but were afraid to ask.
Smaller, more informal format ideal for discussion and debate.
Option hides the servers, without having to include a Tor client in the malware.
This Throwback Thursday, we bring you a series of articles from the archives that looked at virus writers, asking 'who are they?', 'why do they do it?', and other pertinent questions.
Advanced malware also targeted venues linked to Iranian nuclear negotiations.
Infosecurity Europe, BSides London and the Security Bloggers Meetup.
Kevin Williams looks back at UK law enforcement successes at combating cybercrime.
This Throwback Thursday we reflect on the life of one of industry's greats, who sadly passed away this week: Prof. Klaus Brunnstein.
'Logjam' attack possibly used by the NSA to decrypt VPN traffic.
87% discount for students and the option to give a lightning talk.
Once again this Throwback Thursday, we bring you not one but two (related) pieces from the archives as VB heads back to the mid-90s when a new era of viruses was believed to be dawning.
John Hawes reviews Carey Nachenberg's debut novel.
Paul Baccas reviews Data and Goliath 'The Hidden Battles to Collect You Data and Control Your World', by Bruce Schneier.
Once again this Throwback Thursday, we bring you not one but two (related) pieces from the archives as VB heads back to 2000 in the week of the 15th anniversary of the LoveLetter virus.
For most people, the biggest security threat is that of themselves doing something they shouldn't do.
Clean sweep of passes in VB100 test on Red Hat Enterprise Linux.
This Throwback Thursday, we bring you not one but two (related) pieces from the archives as VB heads back to 1996 to look at events surrounding the issuing of the UK's first custodial sentence for writing and distributing computer viruses.
Just because it won't be exploited, doesn't mean you shouldn't patch it.
Test process also uncovers job spam illustrative of trend.
Write an article for the Bulletin, get a half-price ticket for the conference.
This Throwback Thursday, VB heads back to 1997 with 'Through the Administrator's Eye'.
Early bird discounts available for registrations made before 30 June.
Cambridge professor to deliver VB2015 keynote.
Users do choose weak passwords, but they aren't as big a problem as we think.
VB gets in on the Throwback Thursday act, delving into the archives.
Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.
Chinese certificate authority told to re-apply.
Ross Anderson and Costin Raiu to deliver keynote addresses at 25th Virus Bulletin conference.
Details of malware to be discussed at VB2015.
From drones to elephants: an exciting range of topics will be covered in Prague.
Ruchna Nigam provides an overview of more than 60 mobile malware families.
Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.
Protocol has all the advantages of email, yet is orders of magnitude more secure.
Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy.
Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.
One week left to submit an abstract for the 25th Virus Bulletin conference.
First success story for long-awaited CASL.
Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes that can have unintended consequences.
Golden keys from the (first) crypto wars have come back to haunt us.
Dénes Óvári explains how to store code in lossily compressed JPEG data.
Use of email authentication technique unlikely to bring any advantage.
Micky Pun and Neo Tan analyse the banking trojan that is best known for spreading through Skype.
Subject may make many feel uncomfortable, but it is essential that we know how to deal with it.
As emails were sent to wrong servers, DNSSEC might be worth looking into.
Malware remains present on infected machines; 2012 Virus Bulletin paper worth studying.
Each discovered vulnerability is actually a good news story.
Users easily tricked, but plenty of opportunity for the malware to be blocked.
Shared root certificate makes for easy man-in-the-middle attacks.
Grace period added for vulnerabilities that are about to be patched.
Hexiang Hu used tool to detect Bladabindi backdoor.
Hexiang Hu used tool to detect Bladabindi backdoor.
Twitter, Yahoo! amongst early participants in 'ThreatExchange'.
Security vendors to receive alerts when legitimate files are detected as malicious.
Fabio Assolini explains how cybercriminals are targeting boletos.
Wei Xu and his colleagues attempt to block domains before they're used for bad purposes.
CVE-2015-0313 used in the wild as long ago as December.
Many decent performances in VB's latest comparative spam filter test.
It is not as important as is often suggested — and doesn't mean the malware is allowed to execute.
To break into security, start by getting a job in the industry.
Encryption first added as a patch, key only removed when all backups are encrypted.
Chun Feng and Elia Florio analyse two Flash Player vulnerabilities and an IE one where Flash provides a helping hand.
No, it doesn't have to be about malware and no, it doesn't have to be deeply technical either!
Proof-of-concept email gives remote access to Exim mail server.
Thibault Reuille and Dhia Mahjoub use DNS data to look for clusters of malicious domains.
Patch due next week as malvertising leads to Bedep trojan downloader.
Adobe 'investigating reports'.
Large organisations working in national security and international affairs run highest risk.
Raul Alvarez unwraps the many layers of an increasingly prevalent banking trojan.
Vicente Diaz teaches researchers the basics of OPSEC.
End-to-end encryption makes spam filtering more difficult.
Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism.
James Wyke looks at malware that takes extra steps to frustrate researchers.
Company unhappy with Google going full disclosure on privilege escalation vulnerability.
Irfan Asrar looks at the security of the operating system used in many IoT devices.
Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.
See which anti-malware and anti-spam solutions achieved certification.
See you in Prague - and on the Internet!
05 January 2015