VB Blog

Throwback Thursday: The Politics of Anti-Virus

Posted by   Helen Martin on   Nov 10, 2016

President-elect of the United States Donald Trump made a number of promises about cybersecurity during his electoral campaign. What comes of those pledges remains to be seen, but one thing is certain: there will be a team of hard-working, dedicated individuals working behind the scenes to protect the computer systems of Federal government agencies, as there have been for years. Back in 1999, VB published a report describing a day in the life of the Affiliated Computer Services Government Solutions Group (ACS GSG) - the group responsible for providing full service computer support to US Federal government agencies across the United States.

Read more  

VB2016 paper: The TAO of Automated Iframe Injectors - Building Drive-by Platforms For Fun

Posted by   Martijn Grooten on   Oct 18, 2016

We publish Aditya K. Sood's VB2016 paper on the use of iframe injectors by cybercriminals to deliver drive-by downloads.

Read more  

“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker

Posted by   Virus Bulletin on   Sep 26, 2016

An interview with VB2016’s keynote speaker Christine Whalley - Director, Governance and IT Risk Management at Pfizer

Read more  

Throwback Thursday: Following the Breadcrumbs

Posted by   Helen Martin on   Sep 22, 2016

In 1999, Christine Orshesky described how one large organization decided to find out how and where the viruses within it were being obtained so it could do more to protect its networks.

Read more  

VB2016 preview: Cryptography mistakes in malware

Posted by   Martijn Grooten on   Sep 15, 2016

At VB2016, two talks will discuss mistakes made by malware authors in cryptographic implementations. Ben Herzog and Yaniv Balmas will present a paper in which they look at a number of these mistakes, while Malwarebytes researcher hasherezade will present a last-minute paper on making use of some of these mistakes to crack ransomware.

Read more  

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Posted by   Virus Bulletin on   Sep 14, 2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about GPS, about the conference, and about his ultimate dinner party.

Read more  

BSides Denver: Join and Support the Security Community

Posted by   Martijn Grooten on   Sep 13, 2016

If you are coming to VB2016 in Denver, why not spend an extra day in the Mile-High City and join the free BSides Denver conference, which takes place on Saturday?

Read more  

VB2016 'Last-Minute' Papers Announced

Posted by   Martijn Grooten on   Sep 13, 2016

We are excited to announce the addition of the "last-minute" papers to the VB2016 programme: nine presentations covering hot research topics, from OS X attacks to exotic APTs, breaking ransomware and the current state of BGP.

Read more  

VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

Posted by   Martijn Grooten on   Sep 12, 2016

In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi Talbi will present a paper on Haka, a tool that can be used to monitor and debug malware's network communications.

Read more  

Paper: Behavioural Detection and Prevention of Malware on OS X

Posted by   Martijn Grooten on   Sep 12, 2016

In a new paper published through Virus Bulletin, Vincent Van Mieghem presents a novel method for detecting malware on Mac OS X, based on the system calls used by malicious software.

Read more  

Search blog

Scammers take advantage of Epsilon data breach

Trojan hidden as security tool for affected customers.
Trojan hidden as security tool for affected customers. Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by… https://www.virusbulletin.com/blog/2011/04/scammers-take-advantage-epsilon-data-breach/

Department of Justice shuts down Coreflood botnet

'Stop' command sent from replaced command and control servers.
'Stop' command sent from replaced command and control servers. Earlier this week the US Department of Justice (DoJ) obtained an unprecedented temporary restraining order (TRO) that… https://www.virusbulletin.com/blog/2011/04/department-justice-shuts-down-coreflood-botnet/

First AV-Test certifications of 2011 published

22 products scored on multiple scales in quarterly test report.
22 products scored on multiple scales in quarterly test report. Testing organization AV-Test has published its latest round of anti-malware certification tests, with 22 products… https://www.virusbulletin.com/blog/2011/04/first-av-test-certifications-2011-published/

Adobe releases emergency update for Flash Player

Zero-day exploit actively being abused.
Zero-day exploit actively being abused.Adobe has announced it will release an update for its Flash Player on Friday 15 April, fixing a vulnerability that is currently being… https://www.virusbulletin.com/blog/2011/04/adobe-releases-emergency-update-flash-player/

AV-Comparatives unveils latest on-demand results

20 products rated in large-scale detection tests.
20 products rated in large-scale detection tests. Testing organization AV-Comparatives has revealed the results of its latest on-demand test. Top-rated products include Trustport,… https://www.virusbulletin.com/blog/2011/04/av-comparatives-unveils-latest-demand-results/

Ransom trojan demands Windows re-activation

Criminals make money through calls to supposedly free phone number.
Criminals make money through calls to supposedly free phone number. A new piece of ransomware has been discovered that shows the PC user a blue screen and asks them to re-activate… https://www.virusbulletin.com/blog/2011/04/ransom-trojan-demands-windows-re-activation/

Major email service provider suffers data breach

Financial institutions among affected customers.
Financial institutions among affected customers. Email service provider Epsilon, which carries out email marketing for many major companies, has admitted it has fallen victim to a… https://www.virusbulletin.com/blog/2011/04/major-email-service-provider-suffers-data-breach/

RSA gives insight into anatomy of attack on its systems

Publicly available information used to spear phish employees.
Publicly available information used to spear phish employees. Security company RSA has released some information about how hackers gained access to its systems, giving a good… https://www.virusbulletin.com/blog/2011/04/rsa-gives-insight-anatomy-attack-its-systems/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/04/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/04/april-issue-vb-published/

Keylogger on Samsung laptops proves to be false alarm

AV product wrongly flags malware based on existence of directory.
AV product wrongly flags malware based on existence of directory. A number of security bloggers raised concern yesterday about the apparent presence of a keylogger on Samsung… https://www.virusbulletin.com/blog/2011/03/keylogger-samsung-laptops-proves-be-false-alarm/

South Korea proposes to make security software mandatory

Law enables government to search PCs of those who do not comply.
Law enables government to search PCs of those who do not comply. A bill, proposed by a number of South Korean MPs, would make the use of security software mandatory for computer… https://www.virusbulletin.com/blog/2011/03/south-korea-proposes-make-security-software-mandatory/

Rogue SSL certificates issued for popular websites

Certificates revoked, but browsers still need to be updated.
Certificates revoked, but browsers still need to be updated.Comodo, a major vendor of SSL certificates, has admitted to one of its affiliates' servers being hacked, leading to nine… https://www.virusbulletin.com/blog/2011/03/rogue-ssl-certificates-issued-popular-websites/

Cutwail botnet sent 1.7 trillion spam messages

Operators made several million through botnet.
Operators made several million through botnet. Researchers from The Last Line of Defense and universities in Bochum and Santa Barbara have shared some insight into the workings of… https://www.virusbulletin.com/blog/2011/03/cutwail-botnet-sent-1-7-trillion-spam-messages/

Spam levels take a nose dive as Rustock apparently taken down - update

Eerie silence from Rustock botnet. Microsoft reported to have co-ordinated take down.
Eerie silence from Rustock botnet. Microsoft reported to have co-ordinated take down. Spam levels have taken a nose dive over the last 24 hours - apparently as a result of a take… https://www.virusbulletin.com/blog/2011/03/spam-levels-take-nose-dive-rustock-apparently-taken-down-update/

Increase in use of mobile anti-malware protection

Poll shows smartphone users more likely to use anti-malware protection on their phones than three years ago.
Poll shows smartphone users more likely to use anti-malware protection on their phones than three years ago. In a poll of visitors to the VB website, 57% of smartphone users said… https://www.virusbulletin.com/blog/2011/03/increase-use-mobile-anti-malware-protection/

Taking Brain home

Short film features Mikko Hyppönen returning first PC virus to its birthplace.
Short film features Mikko Hyppönen returning first PC virus to its birthplace. Anti-malware vendor F-Secure released a short documentary film this week to mark the 25th anniversary… https://www.virusbulletin.com/blog/2011/03/taking-brain-home/

Tsunami response quick among cybercriminals

Miscreants releasing scams, phishing, scareware... within a matter of hours.
Miscreants releasing scams, phishing, scareware... within a matter of hours. As most of the world reels in shock at the devastation caused by this morning's massive earthquake in… https://www.virusbulletin.com/blog/2011/03/tsunami-response-quick-among-cybercriminals/

Cybercriminals frustrated with botnet trackers

Drastic measures discussed by users of online forum.
Drastic measures discussed by users of online forum. Russian cybercriminals are willing to go to great lengths to frustrate services that hinder botnets created with the ZeuS and… https://www.virusbulletin.com/blog/2011/03/cybercriminals-frustrated-botnet-trackers/

ENISA calls for revised botnet measurements

EU agency says current measures of botnet threat are misleading.
EU agency says current measures of botnet threat are misleading. European cyber security agency, ENISA (the European Network and Information Security Agency) has called for a… https://www.virusbulletin.com/blog/2011/03/enisa-calls-revised-botnet-measurements/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.