VB Blog

Crying wolf revisited

Posted by   Virus Bulletin on   Jul 1, 2002

While one AV vendor comes in for a roasting, the others enjoy the rare taste of the moral high ground.

Read more  

Quarter byte squaw?

Posted by   Virus Bulletin on   Jul 1, 2002

Worryingly, many sysadmins seemed unaware both of the Apache 'chunked encoding' bug and of their systems' vulnerability...

Read more  

Windows XP Professional comparative review

Posted by   Virus Bulletin on   Jun 28, 2002

After re-testing, Panda Antivirus Platinum's on-access scanner product gains a VB 100% award.

Read more  

Shakira cynicism

Posted by   Virus Bulletin on   Jun 7, 2002

As reports begin to appear of the latest VBSWG variant climbing prevalence tables, VB has received a particularly relevant comment from sys-admin Scott Francis.

Read more  

As complex as Euler's formula

Posted by   Virus Bulletin on   Jun 5, 2002

IT news website Slashdot's report of Simile's cross-platform capabilities was met with the usual host of ill-informed, biased and naïve comments from users of the site.

Read more  

Outraged of Slovakia

Posted by   Virus Bulletin on   May 23, 2002

Is there really any need to include virus samples in product tests? CNET seems to think it's not worth the bother.

Read more  

Closed source sauce

Posted by   Virus Bulletin on   May 22, 2002

Microsoft has claimed that open source software threatens security - unlike proprietary software such as its own SQL Server, currently playing vector to a new worm.

Read more  

Search blog

Is publishing your employees' email addresses such a big deal?

Beware of a false sense of security.
Beware of a false sense of security. Security blogger Graham Cluley points to hypocrisy in a KPMG press release in which it criticises FTSE 350 companies for 'leaking data that can… https://www.virusbulletin.com/blog/2013/07/publishing-your-employees-email-addresses-such-big-deal/

Compromised Yahoo! accounts continue to spread Android malware

Problem likely to be on Yahoo!'s side.
Problem likely to be on Yahoo!'s side. In recent weeks, we have noticed an uptick in the amount of spam sent from compromised Yahoo! accounts; we have reasons to believe the… https://www.virusbulletin.com/blog/2013/06/compromised-yahoo-accounts-continue-spread-android-malware/

Vulnerabilities could trigger payload in emails upon receiving or opening

Flaws in IBM Notes and Exim/Dovecot easy to mitigate.
Flaws in IBM Notes and Exim/Dovecot easy to mitigate. Two recently discovered vulnerabilities in mail processing software could give an attacker access to a targeted system without… https://www.virusbulletin.com/blog/2013/05/vulnerabilities-could-trigger-payload-emails-upon-receiving-or-opening/

Different focus on spam needed

What happens before the filter doesn't matter too much.
What happens before the filter doesn't matter too much. It is surprisingly difficult to get accurate figures for the amount of spam that is sent globally, yet everyone agrees that… https://www.virusbulletin.com/blog/2013/04/different-focus-spam-needed/

Weak cryptography keys allow others to add valid DKIM signatures to fake emails

512-bit key cracked within 72 hours.
512-bit key cracked within 72 hours. A Florida-based mathematician has caused a stir in the email community by adding a valid DKIM signature for google.com to an email after… https://www.virusbulletin.com/blog/2012/10/weak-cryptography-keys-allow-others-add-valid-dkim-signatures-fake-emails/

Cybercriminals offering service flooding email, phone and SMS

DDoS-type attack could seriously disrupt business.
DDoS-type attack could seriously disrupt business. A new service is being offered on underground forums where between 25,000 and 100,000 emails are being sent to an email account… https://www.virusbulletin.com/blog/2012/07/cybercriminals-offering-service-flooding-email-phone-and-sms/

New RFC describes best practices for running DNS-based lists

DNSBL users advised to avoid those lists that charge for delisting.
DNSBL users advised to avoid those lists that charge for delisting. A new RFC document has been published that describes the best operational practices for the use of DNS-based… https://www.virusbulletin.com/blog/2012/01/new-rfc-describes-best-practices-running-dns-based-lists/

New RFC grants DKIM improved status

Email signing method now 'Draft Standard'.
Email signing method now 'Draft Standard'. The Internet Engineering Task Force (IETF) has published a new RFC describing the DKIM protocol which sees its status advance from… https://www.virusbulletin.com/blog/2011/09/new-rfc-grants-dkim-improved-status/

Windows Help Files used in targeted attacks

Files with code-executing properties attached to emails.
Files with code-executing properties attached to emails. Researchers at Symantec have discovered Windows Help Files being used in targeted attacks. Such help files, which use the… https://www.virusbulletin.com/blog/2011/09/windows-help-files-used-targeted-attacks/

Researchers find email used in RSA hack

Email with malicious attachment uploaded to online scanning service
Email with malicious attachment uploaded to online scanning service Researchers at F-Secure have managed to obtain the file used in the targeted attack against security vendor RSA… https://www.virusbulletin.com/blog/2011/08/researchers-find-email-used-rsa-hack/

Hotmail beefs up security with stricter password policy

'My friend has been spammed' button also welcomed by experts.
'My friend has been spammed' button also welcomed by experts.Microsoft's free webmail service Hotmail has introduced some new features which should make it less likely for its… https://www.virusbulletin.com/blog/2011/07/hotmail-beefs-security-stricter-password-policy/

'Job application' contains malicious attachment

$150,000 lost via banking trojan.
$150,000 lost via banking trojan. An unidentified US company has learned the hard way that email attachments - even to those that appear to be solicited - may contain malware. The… https://www.virusbulletin.com/blog/2011/01/job-application-contains-malicious-attachment/

ARF published as IETF standard

Abuse report format helps auto-handling of email complaints
Abuse report format helps auto-handling of email complaints ARF (Abuse Reporting Format) has been approved by the IETF as an Internet standard. ARF is a format used to send… https://www.virusbulletin.com/blog/2010/09/arf-published-ietf-standard/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.