VB Blog

Virus Bulletin at RSA

Posted by   Martijn Grooten on   Apr 13, 2018

Next week, VB Editor Martijn Grooten will be at the RSA Conference in San Francisco.

Read more  

Broad-ranging and international VB2018 programme announced

Posted by   Martijn Grooten on   Apr 11, 2018

VB is excited to reveal the details of an interesting and diverse programme for VB2018, the 28th Virus Bulletin International Conference, which takes place 3-5 October in Montreal, Canada.

Read more  

Netflix issue shows email verification really does matter

Posted by   Martijn Grooten on   Apr 10, 2018

A clever trick taking advantage of the fact that Gmail ignores dots in email addresses could be used to trick someone into paying for your Netflix subscription - demonstrating the importance of confirmed opt-in.

Read more  

VB2017 paper: Exploring the virtual worlds of advergaming

Posted by   Martijn Grooten on   Apr 10, 2018

At VB2017 in Madrid, Malwarebytes' Chris Boyd presented a paper in which he looked at various aspects of advergaming, from unreadable EULAs to fake programs that promise to block ads. Today, we publish both the paper and the recording of Chris's presentation.

Read more  

New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach

Posted by   Martijn Grooten on   Mar 27, 2018

Two or more mobile apps, viewed independently, may not appear to be malicious - but in combination, they could become harmful by exchanging information with one another and by performing malicious activities together. Today, we publish a new paper by a group of researchers affiliated with various UK universities and companies, which looks at how machine-learning methods can be used to detect app collusions.

Read more  

VB2016 paper: Wild Android collusions

Posted by   Martijn Grooten on   Mar 26, 2018

At VB2016 in Denver, Jorge Blasco presented a paper (co-written with Thomas M. Chen, Igor Muttik and Markus Roggenbach), in which he discussed the concept of app collusion - where two (or more) apps installed on the same device work together to collect and extract data from the device - and presented discoveries of colluding code in many in-the-wild apps. Today, we publish both the paper and the recording of Jorge's presentation.

Read more  

VB2017 paper: The life story of an IPT - Inept Persistent Threat actor

Posted by   Martijn Grooten on   Mar 19, 2018

At VB2017 in Madrid, Polish security researcher and journalist Adam Haertlé presented a paper about a very inept persistent threat. Today, we publish both the paper and the recording of Adam's presentation.

Read more  

Five reasons to submit a VB2018 paper this weekend

Posted by   Martijn Grooten on   Mar 16, 2018

The call for papers for VB2018 closes on 18 March, and while we've already received many great submissions, we still want more! Here are five reasons why you should submit a paper this weekend.

Read more  

First partners of VB2018 announced

Posted by   Martijn Grooten on   Mar 15, 2018

We are excited to announce the first six companies to partner with VB2018.

Read more  

VB2018: looking for technical and non-technical talks

Posted by   Martijn Grooten on   Mar 9, 2018

We like to pick good, solid technical talks for the VB conference programme, but good talks don't have to be technical and we welcome less technical submissions just as much.

Read more  

Search blog

Save your soul with spam

Spam goes yet one step further - spiritual salvation!
Spam goes yet one step further - spiritual salvation! We are all accustomed to receiving spam that advertises herbal medicines, designer watches, new mortgages and online degrees… https://www.virusbulletin.com/blog/2004/12/save-your-soul-spam/

Season's greetings

The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous new year.
The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous new year. The VB team wishes all Virus Bulletin readers a very happy Christmas and a… https://www.virusbulletin.com/blog/2004/12/season-s-greetings/

Email authentication in the open

35 high-profile organisations sign open letter, calling for a rapid rollout of email authentication technologies
35 high-profile organisations sign open letter, calling for a rapid rollout of email authentication technologies Last month an open letter was sent to members of the US Federal… https://www.virusbulletin.com/blog/2004/12/email-authentication-open/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/12/

Spam-reporting trial

Australia's latest anti-spam initiative
Australia's latest anti-spam initiative The Australian Communications Authority (ACA) is teaming up with Internet Service Provider Pacific Internet and software company… https://www.virusbulletin.com/blog/2004/12/spam-reporting-trial/

Australia to protect critical computer systems

Vulnerability assessment for country's critical infrastructure systems
Vulnerability assessment for country's critical infrastructure systems The Australian government is to spend more than 8 million dollars on a project that will identify and fix… https://www.virusbulletin.com/blog/2004/11/australia-protect-critical-computer-systems/

Lycos turns hippy on spam

'Make love not spam'
'Make love not spam' Lycos Europe has come up with an interesting new way for its users to feel they are getting their own back on spammers. Lycos is encouraging its users to… https://www.virusbulletin.com/blog/2004/11/lycos-turns-hippy-spam/

Spam survey

Do women hate spam more than men? Are humans better at identifying spam than computers? Make your contribution to (anti-)spam research...
Do women hate spam more than men? Are humans better at identifying spam than computers? Make your contribution to (anti-)spam research... John Graham-Cumming, author of POPFile… https://www.virusbulletin.com/blog/2004/11/spam-survey/

Standardised malware naming for the new year

An end to the virus-naming problem?
An end to the virus-naming problem? A new initiative that aims to standardise malware naming may be in operation as early as January 2005. The US Department of Homeland… https://www.virusbulletin.com/blog/2004/11/standardised-malware-naming-new-year/

Most spammed

Think you've got it bad? Spare a thought for Bill.
Think you've got it bad? Spare a thought for Bill. Microsoft Chairman Bill Gates is the world's most spammed email recipient. The (let's face it, not entirely surprising) fact… https://www.virusbulletin.com/blog/2004/11/most-spammed/

29A virus writer sentenced

Member of notorious virus-writing group found guilty.
Member of notorious virus-writing group found guilty. A Russian virus writer has been found guilty of creating viruses and fined the somewhat paltry sum of 3,000 roubles. Eugene… https://www.virusbulletin.com/blog/2004/11/29a-virus-writer-sentenced/

Latest VGrep

The latest version of the virus name lookup tool - VGrep, is now available.
The latest version of the virus name lookup tool - VGrep, is now available. VGrep is a system produced in an attempt to clear up some of the confusion surrounding the naming of… https://www.virusbulletin.com/blog/2004/11/latest-vgrep/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/11/

Spam becomes a collectors' item

British man sets up his own Museum of Spam.
British man sets up his own Museum of Spam. Just in case you hadn't already seen enough spam in your inbox, or in case your spam filter is so efficient that you find yourself… https://www.virusbulletin.com/blog/2004/10/spam-becomes-collectors-item/

November issue released

The Virus Bulletin November issue is on its way.
The Virus Bulletin November issue is on its way. It's that time of the month again... If you are a subscriber to Virus Bulletin, you should be receiving your November issue… https://www.virusbulletin.com/blog/2004/10/november-issue-released/

Dial a detection

Guidance issued on how to deal with rogue Internet diallers ('porn diallers')
Guidance issued on how to deal with rogue Internet diallers ('porn diallers') UK telecoms watchdog the Independent Committee for the Supervision of Standards of Telephone… https://www.virusbulletin.com/blog/2004/10/dial-detection/

Phishy goings on

Fewer than five zombie network operators are responsible for all Internet phishing attacks worldwide according to CipherTrust...
Fewer than five zombie network operators are responsible for all Internet phishing attacks worldwide according to CipherTrust... According to Commtouch Software the US, UK,… https://www.virusbulletin.com/blog/2004/10/phishy-goings/

Storms put the wind up spammers

Significant decline in the volume of spam messages seen in the days immediately following the three recent hurricanes.
Significant decline in the volume of spam messages seen in the days immediately following the three recent hurricanes. Email security firm FrontBridge Technologies Inc. reported… https://www.virusbulletin.com/blog/2004/10/storms-put-wind-spammers/

Spam gets the sniffles

Spammers seize the opportunity to cash in on the US flu vaccine problem.
Spammers seize the opportunity to cash in on the US flu vaccine problem. Not only has the shortage of flu vaccine been something of a political hot potato in the run up to the US… https://www.virusbulletin.com/blog/2004/10/spam-gets-sniffles/

Sender ID specification revised

Microsoft has another stab at getting its email authentication protocol approved.
Microsoft has another stab at getting its email authentication protocol approved. Microsoft has revised its Sender ID email authentication protocol and resubmitted it to the… https://www.virusbulletin.com/blog/2004/10/sender-id-specification-revised/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.