VB Blog

When it comes to online banking, sub-optimal encryption isn't our biggest concern

Posted by   Virus Bulletin on   Jan 6, 2016

Malware authors and scammers won't attack the crypto.

Read more  

Malware likely cause of power cut in Ukraine

Posted by   Virus Bulletin on   Jan 5, 2016

BlackEnergy malware previously linked to targeted attacks in the country.

Read more  

Call for Papers: VB2016 Denver

Posted by   Virus Bulletin on   Dec 22, 2015

VB seeks submissions for the 26th Virus Bulletin Conference.

Read more  

VB2015 video: Making a dent in Russian mobile banking phishing

Posted by   Virus Bulletin on   Dec 16, 2015

Sebastian Porst explains what Google has done to protect users from phishing apps targeting Russian banks.

Read more  

Conference review: Botconf 2015

Posted by   Virus Bulletin on   Dec 15, 2015

Third botnet fighting conference another big success.

Read more  

High spam catch rates continue in latest spam filter test

Posted by   Virus Bulletin on   Dec 14, 2015

US presidential candidates regularly see their emails blocked by spam filters.

Read more  

Throwback Thursday: A View from the Lab

Posted by   Virus Bulletin on   Dec 3, 2015

This Throwback Thursday, VB heads back to 1997 with 'A View from the Lab'.

Read more  

Paper: Optimizing ssDeep for use at scale

Posted by   Virus Bulletin on   Nov 27, 2015

Brian Wallace presents tool to optimize ssDeep comparisons.

Read more  

Throwback Thursday: Legal attempts to reduce spam. A UK perspective

Posted by   Virus Bulletin on   Nov 19, 2015

This Throwback Thursday, we turn the clock back to November 2003, when spam was such a hot topic that VB decided to launch a dedicated 'VB Spam Supplement'.

Read more  

Paper: 3ROS exploit framework kit — one more for the infection road

Posted by   Virus Bulletin on   Nov 13, 2015

Aditya K. Sood and Rohit Bansal highlight a different side of an exploit kit.

Read more  

Search blog

Trojans and worms hiding behind games

Mario latest lure to hook victims on malware.
Mario latest lure to hook victims on malware. Social engineering techniques used to trick computer users into running malicious code on their systems concentrate around simple… https://www.virusbulletin.com/blog/2007/08/trojans-and-worms-hiding-behind-games/

New OpenOffice proof-of-concept widely noted

Odd payload, not spreading danger, brings attention to cross-platform worm.
Odd payload, not spreading danger, brings attention to cross-platform worm. A new proof-of-concept malware exploiting the OpenOffice document format has made headlines across the… https://www.virusbulletin.com/blog/2007/05/new-openoffice-proof-concept-widely-noted/

Phishing moves into more new areas

Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers.
Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers. The latest social-engineering methods being put to use by phishers show no let up in… https://www.virusbulletin.com/blog/2007/05/phishing-moves-more-new-areas/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.