VB Blog

Tizi Android malware highlights the importance of security patches for high-risk users

Posted by   Martijn Grooten on   Nov 28, 2017

Researchers from Google have taken down 'Tizi', an Android malware family, that used nine already patched vulnerabilities to obtain root on infected devices.

Read more  

Virus Bulletin to attend AMTSO, AVAR and Botconf

Posted by   Martijn Grooten on   Nov 27, 2017

Next week, Virus Bulletin researchers will be attending the AMTSO meeting and AVAR conference in Beijing, China, as well as the 5th edition of the Botconf conference in Montpellier, France.

Read more  

VB2017 video: FinFisher: New techniques and infection vectors revealed

Posted by   Martijn Grooten on   Nov 24, 2017

Today, we publish the video of the VB2017 presentation by ESET researcher Filip Kafka, who looked at recent changes in the FinFisher government malware, including its infection vectors.

Read more  

Throwback Thursday: The beginning of the end(point): where we are now and where we'll be in five years

Posted by   Martijn Grooten on   Nov 23, 2017

We look back at the VB2016 presentation by Adrian Sanabria on the state of endpoint security, both now and in the future.

Read more  

VB2017 paper: Beyond lexical and PDNS: using signals on graphs to uncover online threats at scale

Posted by   Martijn Grooten on   Nov 22, 2017

At VB2017 in Madrid, Cisco Umbrella (OpenDNS) researchers Dhia Mahjoub and David Rodriguez presented a new approach to detecting infected machines using graphs to detect botnet traffic at scale. Today we publish both Dhia and David's paper and the recording of their presentation.

Read more  

Firefox 59 to make it a lot harder to use data URIs in phishing attacks

Posted by   Martijn Grooten on   Nov 21, 2017

Firefox developer Mozilla has announced that, as of version 59 of the browser, many kinds of data URIs, which provide a way to create "domainless web content", will not be rendered in the browser, thus making this trick - used in various phishing campaigns - a lot less attractive.

Read more  

Standalone product test: FireEye Endpoint

Posted by   Martijn Grooten on   Nov 16, 2017

Virus Bulletin ran a standalone test on FireEye's Endpoint Security solution.

Read more  

VB2017 video: Consequences of bad security in health care

Posted by   Martijn Grooten on   Nov 13, 2017

Jelena Milosevic, a nurse with a passion for IT security, is uniquely placed to witness poor security practices in the health care sector, and to fully understand the consequences. Today, we publish the recording of a presentation given by Jelena at VB2017 in Madrid, in which she shared her inside view of security in hospitals.

Read more  

Vulnerabilities play only a tiny role in the security risks that come with mobile phones

Posted by   Martijn Grooten on   Nov 9, 2017

Both bad news (all devices were pwnd) and good news (pwning is increasingly difficult) came from the most recent mobile Pwn2Own competition. But the practical security risks that come with using mobile phones have little to do with vulnerabilities.

Read more  

VB2017 paper: The (testing) world turned upside down

Posted by   Martijn Grooten on   Nov 8, 2017

At VB2017 in Madrid, industry veteran and ESET Senior Research Fellow David Harley presented a paper on the state of security software testing. Today we publish David's paper in both HTML and PDF format.

Read more  

Search blog

Save your soul with spam

Spam goes yet one step further - spiritual salvation!
Spam goes yet one step further - spiritual salvation! We are all accustomed to receiving spam that advertises herbal medicines, designer watches, new mortgages and online degrees… https://www.virusbulletin.com/blog/2004/12/save-your-soul-spam/

Season's greetings

The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous new year.
The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous new year. The VB team wishes all Virus Bulletin readers a very happy Christmas and a… https://www.virusbulletin.com/blog/2004/12/season-s-greetings/

Email authentication in the open

35 high-profile organisations sign open letter, calling for a rapid rollout of email authentication technologies
35 high-profile organisations sign open letter, calling for a rapid rollout of email authentication technologies Last month an open letter was sent to members of the US Federal… https://www.virusbulletin.com/blog/2004/12/email-authentication-open/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/12/

Spam-reporting trial

Australia's latest anti-spam initiative
Australia's latest anti-spam initiative The Australian Communications Authority (ACA) is teaming up with Internet Service Provider Pacific Internet and software company… https://www.virusbulletin.com/blog/2004/12/spam-reporting-trial/

Australia to protect critical computer systems

Vulnerability assessment for country's critical infrastructure systems
Vulnerability assessment for country's critical infrastructure systems The Australian government is to spend more than 8 million dollars on a project that will identify and fix… https://www.virusbulletin.com/blog/2004/11/australia-protect-critical-computer-systems/

Lycos turns hippy on spam

'Make love not spam'
'Make love not spam' Lycos Europe has come up with an interesting new way for its users to feel they are getting their own back on spammers. Lycos is encouraging its users to… https://www.virusbulletin.com/blog/2004/11/lycos-turns-hippy-spam/

Spam survey

Do women hate spam more than men? Are humans better at identifying spam than computers? Make your contribution to (anti-)spam research...
Do women hate spam more than men? Are humans better at identifying spam than computers? Make your contribution to (anti-)spam research... John Graham-Cumming, author of POPFile… https://www.virusbulletin.com/blog/2004/11/spam-survey/

Standardised malware naming for the new year

An end to the virus-naming problem?
An end to the virus-naming problem? A new initiative that aims to standardise malware naming may be in operation as early as January 2005. The US Department of Homeland… https://www.virusbulletin.com/blog/2004/11/standardised-malware-naming-new-year/

Most spammed

Think you've got it bad? Spare a thought for Bill.
Think you've got it bad? Spare a thought for Bill. Microsoft Chairman Bill Gates is the world's most spammed email recipient. The (let's face it, not entirely surprising) fact… https://www.virusbulletin.com/blog/2004/11/most-spammed/

29A virus writer sentenced

Member of notorious virus-writing group found guilty.
Member of notorious virus-writing group found guilty. A Russian virus writer has been found guilty of creating viruses and fined the somewhat paltry sum of 3,000 roubles. Eugene… https://www.virusbulletin.com/blog/2004/11/29a-virus-writer-sentenced/

Latest VGrep

The latest version of the virus name lookup tool - VGrep, is now available.
The latest version of the virus name lookup tool - VGrep, is now available. VGrep is a system produced in an attempt to clear up some of the confusion surrounding the naming of… https://www.virusbulletin.com/blog/2004/11/latest-vgrep/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/11/

Spam becomes a collectors' item

British man sets up his own Museum of Spam.
British man sets up his own Museum of Spam. Just in case you hadn't already seen enough spam in your inbox, or in case your spam filter is so efficient that you find yourself… https://www.virusbulletin.com/blog/2004/10/spam-becomes-collectors-item/

November issue released

The Virus Bulletin November issue is on its way.
The Virus Bulletin November issue is on its way. It's that time of the month again... If you are a subscriber to Virus Bulletin, you should be receiving your November issue… https://www.virusbulletin.com/blog/2004/10/november-issue-released/

Dial a detection

Guidance issued on how to deal with rogue Internet diallers ('porn diallers')
Guidance issued on how to deal with rogue Internet diallers ('porn diallers') UK telecoms watchdog the Independent Committee for the Supervision of Standards of Telephone… https://www.virusbulletin.com/blog/2004/10/dial-detection/

Phishy goings on

Fewer than five zombie network operators are responsible for all Internet phishing attacks worldwide according to CipherTrust...
Fewer than five zombie network operators are responsible for all Internet phishing attacks worldwide according to CipherTrust... According to Commtouch Software the US, UK,… https://www.virusbulletin.com/blog/2004/10/phishy-goings/

Storms put the wind up spammers

Significant decline in the volume of spam messages seen in the days immediately following the three recent hurricanes.
Significant decline in the volume of spam messages seen in the days immediately following the three recent hurricanes. Email security firm FrontBridge Technologies Inc. reported… https://www.virusbulletin.com/blog/2004/10/storms-put-wind-spammers/

Spam gets the sniffles

Spammers seize the opportunity to cash in on the US flu vaccine problem.
Spammers seize the opportunity to cash in on the US flu vaccine problem. Not only has the shortage of flu vaccine been something of a political hot potato in the run up to the US… https://www.virusbulletin.com/blog/2004/10/spam-gets-sniffles/

Sender ID specification revised

Microsoft has another stab at getting its email authentication protocol approved.
Microsoft has another stab at getting its email authentication protocol approved. Microsoft has revised its Sender ID email authentication protocol and resubmitted it to the… https://www.virusbulletin.com/blog/2004/10/sender-id-specification-revised/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.