VB Blog

VB2017 preview: Calling all PUA fighters

Posted by   Martijn Grooten on   Aug 31, 2017

We preview the VB2017 Small Talk to be given by AppEsteem's Dennis Batchelder that should help security vendors make decisions about apps whose behaviours sit right on the limits of what is acceptable from a security point of view.

Read more  

VB2017 preview: From insider threat to insider asset: a practical guide

Posted by   Martijn Grooten on   Aug 30, 2017

We preview the VB2017 paper by Forcepoint's Kristin Leary and Richard Ford, who will discuss a practical approach to preventing insider attacks.

Read more  

WireX DDoS botnet takedown shows the best side of the security industry

Posted by   Martijn Grooten on   Aug 29, 2017

Collaboration between a number of security companies has led to the takedown of the WireX Android DDoS botnet. Efforts like these, and the fact that the companies involved all decided to publish the very same blog post, show the best side of the security industry.

Read more  

VB2017 preview: Your role in child abuse

Posted by   Martijn Grooten on   Aug 28, 2017

We preview the VB2017 presentation by Mick Moran, who will discuss online child abuse and the role the security community can play fighting it.

Read more  

ROPEMAKER email exploit is of limited practical use

Posted by   Martijn Grooten on   Aug 28, 2017

Researchers at Mimecast have published a paper about the 'ROPEMAKER' exploit, which allows an email sender with malicious intentions to change the visial appearance of an email after it has been delivered.

Read more  

VB2017 preview: Mariachis and jackpotting: ATM malware from Latin America

Posted by   Martijn Grooten on   Aug 25, 2017

We preview the VB2017 presentation by Kaspersky Lab researchers Thiago Marques and Fabio Assolini in which they look at malware targeting ATMs in Latin America.

Read more  

VB2017 preview: Stuck between a ROC and a hard place

Posted by   Martijn Grooten on   Aug 24, 2017

We preview the VB2017 paper by Microsoft's Holly Stewart and Joe Blackbird, which uses data about users switching anti-virus provider to decide whether machine-learning models should favour avoiding false positives over false negatives.

Read more  

VB2017 preview: Consequences of bad security in health care

Posted by   Martijn Grooten on   Aug 23, 2017

We preview the VB2017 presentation by Jelena Milosevic, an ICU nurse by profession, who will provide the audience with an inside view of security in hospitals.

Read more  

VB2017 Small Talk: The encryption vs. inspection debate

Posted by   Martijn Grooten on   Aug 22, 2017

At VB2017, Cloudflare's Head of Cryptography Nick Sullivan will give a Small Talk on the intercepting of HTTPS connections by proxies and anti-virus software.

Read more  

Throwback Thursday: Ten memorable Virus Bulletin conference presentations - part 2

Posted by   Virus Bulletin on   Aug 10, 2017

In the second part of this two-part blog series, we look at five more memorable Virus Bulletin conference presentations.

Read more  

Search blog

Symbian worm sighted in the wild

Malware pretends to be media or image file.
Malware pretends to be media or image file. A new worm has been sighted in the wild that operates on the Symbian operating system, which is used on many mobile phones. The worm,… https://www.virusbulletin.com/blog/2008/01/symbian-worm-sighted-wild/

US agencies report vishing, extortion, danger of hacking

FBI name used in email attacks, CIA warns of power supply hacks.
FBI name used in email attacks, CIA warns of power supply hacks. US security and law enforcement agencies were more than usually active in the computer security world last week,… https://www.virusbulletin.com/blog/2008/01/us-agencies-report-vishing-extortion-danger-hacking/

Google links scam Avira users

Suspect firm advertising via Google found to be specialising in hijacking security brands.
Suspect firm advertising via Google found to be specialising in hijacking security brands.Google searches for Avira and the company's anti-malware product Antivir, a free version… https://www.virusbulletin.com/blog/2008/01/google-links-scam-avira-users/

Microsoft alert on Excel vulnerability

Targeted exploitation of zero-day flaw seen in wild.
Targeted exploitation of zero-day flaw seen in wild.Microsoft has issued a security advisory on an unresolved vulnerability in its Excel software, which has been reported as a… https://www.virusbulletin.com/blog/2008/01/microsoft-alert-excel-vulnerability/

Help for victims of e-crime

Cybercrime support website launched.
Cybercrime support website launched. A website dedicated to helping victims of online crime and other incidents has been launched in the UK. The site, www.e-victims.org, aims to… https://www.virusbulletin.com/blog/2008/01/help-victims-e-crime/

Malcode from Mexico and Africa predicted to boom

Developing world expected to contribute heavily to future cybercrime.
Developing world expected to contribute heavily to future cybercrime. A report from F-Secure has predicted increasing levels of malware creation and operation in 'developing'… https://www.virusbulletin.com/blog/2008/01/malcode-mexico-and-africa-predicted-boom/

Stormy love letters

Storm botnet celebrates birthday with new wave of spam.
Storm botnet celebrates birthday with new wave of spam. Earlier this week malware experts warned of likely increased activity of the Storm botnet around Valentine's Day next month.… https://www.virusbulletin.com/blog/2008/01/stormy-love-letters/

Rogue anti-malware targets Mac users

Scam expands horizons to draw in new market of victims.
Scam expands horizons to draw in new market of victims. The rogue anti-malware scam, in which fake anti-spyware and anti-virus products are inveigled into victims' machines,… https://www.virusbulletin.com/blog/2008/01/rogue-anti-malware-targets-mac-users/

Phishing danger increases as Storm botnet is hired out

Smart new trojan and Storm diversification add to online banking risk.
Smart new trojan and Storm diversification add to online banking risk. The dangers of banking online grew significantly in past weeks, as portions of the ever-expanding Storm… https://www.virusbulletin.com/blog/2008/01/phishing-danger-increases-storm-botnet-hired-out/

Spam printing proof-of-concept revealed

Lack of security allows websites to send spammish content to network printers.
Lack of security allows websites to send spammish content to network printers. Opening your inbox on a Monday morning and finding out that it's full of spam is bad enough already,… https://www.virusbulletin.com/blog/2008/01/spam-printing-proof-concept-revealed/

Hundreds of legitimate websites being hacked into

New mass infection leaves security researchers puzzled.
New mass infection leaves security researchers puzzled. Web security company ScanSafe has reported a new mass infection of websites, which it claims accounts for 15% of the web… https://www.virusbulletin.com/blog/2008/01/hundreds-legitimate-websites-being-hacked/

Batch of Dutch MP3 players ships with malware

Worm included as unwanted extra for music lovers.
Worm included as unwanted extra for music lovers. A shipment of MP3 players sold in recent months by Dutch firm Victory has been found to be infected with the Fujacks worm, which… https://www.virusbulletin.com/blog/2008/01/batch-dutch-mp3-players-ships-malware/

Usual fare for holiday season

Storm ecards and social site spyware mark unsurprising year end.
Storm ecards and social site spyware mark unsurprising year end. With large portions of the globe celebrating various festivals over the past few weeks, an expected upsurge in… https://www.virusbulletin.com/blog/2008/01/usual-fare-holiday-season/

SQL attack hacks wide range of sites

CA among victims of major attack linking sites to malware.
CA among victims of major attack linking sites to malware. Huge numbers of legitimate websites - perhaps as many as 100,000 according to some reports - fell victim to hackers… https://www.virusbulletin.com/blog/2008/01/sql-attack-hacks-wide-range-sites/

More rogue Flash ads

Rogue ads infiltrate Expedia and Rhapsody sites.
Rogue ads infiltrate Expedia and Rhapsody sites. Following on from last month's feature on the SWF.AdHijack family (see VB, January 2008, p.12), malicious Flash ads were found to… https://www.virusbulletin.com/blog/2008/01/more-rogue-flash-ads/

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/01/january-issue-vb-published/

FTC notes malicious spam on the rise

FTC reports on a decade of spam fighting.
FTC reports on a decade of spam fighting. The US Federal Trade Commission (FTC) has released a report reflecting on the ten years in which it has been involved in the fight… https://www.virusbulletin.com/blog/2008/01/ftc-notes-malicious-spam-rise/

All in the name

Grisoft becomes AVG.
Grisoft becomes AVG. Last month, Czech firm Grisoft, developer of widely used anti-malware product AVG, changed its corporate name to AVG Technologies CZ, s.r.o. Having operated… https://www.virusbulletin.com/blog/2008/01/all-name/

No taste for spam?

ICANN takes steps to combat domain tasting.
ICANN takes steps to combat domain tasting. The practice of domain tasting, often used by spammers and other shady types to register tens of thousands of Internet domain names at… https://www.virusbulletin.com/blog/2008/01/no-taste-spam/

Prolific spammer indicted

Notorious spammer Alan Ralsky charged with spamming and stock fraud.
Notorious spammer Alan Ralsky charged with spamming and stock fraud. Infamous prolific spammer Alan Ralsky has been indicted over his alleged involvement in an international… https://www.virusbulletin.com/blog/2008/01/prolific-spammer-indicted/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.