VB Blog

Paper: New Keylogger on the Block

Posted by   Martijn Grooten on   Jul 5, 2016

In a new paper published by Virus Bulletin, Sophos researcher Gabor Szappanos takes a look at the KeyBase keylogger, sold as a commercial product and popular among cybercriminals who use it in Office exploit kits.

Read more  

BSides Denver to take place the day after VB2016

Posted by   Martijn Grooten on   Jun 28, 2016

VB2016, the 26th International Virus Bulletin conference, is an excellent reason to go to Denver, Colorado in the first week of October. But there is another reason to come to Denver: BSides Denver, which will take place the day after VB2016, on Saturday 8 October 2016.

Read more  

VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format

Posted by   Virus Bulletin on   Jun 13, 2016

In their VB2015 paper, Peter Kálnai and Jaromír Hořejší look at the current state of DDoS trojans forming covert botnets on unsuspecting systems. The paper provides a technical analysis of the most important malware families, focusing on infection methods, dynamic behaviour, C&C communication, obfuscation techniques, advanced methods of persistence and stealth, and elimination of rivals.

Read more  

Throwback Thursday: Hyppönen, that Data Fellow / Finnish Sprayer

Posted by   Helen Martin on   Jun 2, 2016

This week, well known and universally respected industry guru Mikko Hyppönen celebrates his 25th anniversary of working at F-Secure (formerly known as Data Fellows). VB takes a look back in the archives at two articles published in 1994: an "insight" into the life and work of the then rising star of the anti-virus world, and a virus analysis penned by the man himself.

Read more  

VB2015 paper: Economic Sanctions on Malware

Posted by   Helen Martin on   Jun 1, 2016

Financial pressure can be a proactive and potentially very effective tool in making our computer ecosystems safer. By cleverly employing various trust metrics and technologies such as digital signing, watermarking, and public-key infrastructure in strategically selected places, we can encourage good behaviours and punish bad ones. In his VB2015 paper, Igor Muttik analyses and gives examples of technologies (certificates, credentials, etc.) to de-incentivize bad behaviours in several ecosystems (Windows, Android, iOS).

Read more  

Virus Bulletin's job site for recruiters and job seekers

Posted by   Martijn Grooten on   May 26, 2016

Virus Bulletin has relaunched its security job vacancy service and added a new section, in which job seekers can advertise their skills and experience.

Read more  

Throwback Thursday: One_Half: The Lieutenant Commander?

Posted by   Helen Martin on   May 26, 2016

In October 1994, a new multi-partite virus appeared, using some of the techniques developed by the Dark Avenger in Commander_Bomber. As if this were not enough, the One_Half virus could also encrypt vital parts of the fixed disk. Eugene Kaspersky provided a detailed analysis.

Read more  

Advertisements on Blogspot sites lead to support scam

Posted by   Martijn Grooten on   May 9, 2016

Support scam pop-ups presented through malicious advertisements show that, next to vulnerable end points, gullible users remain an easy source of money for online criminals.

Read more  

To make Tor work better on the web, we need to be honest about it

Posted by   Martijn Grooten on   May 6, 2016

Many websites put barriers in front of visitors who use the Tor network. If we want to make the web more accessible through Tor, we need to be honest about why this is done, rather than cry wolf about a dislike for privacy, Martijn Grooten says.

Read more  

Paper: How It Works: Steganography Hides Malware in Image Files

Posted by   Martijn Grooten on   Apr 28, 2016

A new paper by CYREN researcher Lordian Mosuela takes a close look at Gatak, or Stegoloader, a piece of malware that was discovered last year and that is controlled via malicious code embedded in a PNG image, a technique known as steganography.

Read more  

Search blog

Sender ID specification revised

Microsoft has another stab at getting its email authentication protocol approved.
Microsoft has another stab at getting its email authentication protocol approved. Microsoft has revised its Sender ID email authentication protocol and resubmitted it to the… https://www.virusbulletin.com/blog/2004/10/sender-id-specification-revised/

RSS activated

Virus Bulletin RSS feeds revamped and live again.
Virus Bulletin RSS feeds revamped and live again. Although RSS feeds have been available from VB for some time, today we have revamped them and made them accessable to all. You… https://www.virusbulletin.com/blog/2004/10/rss-activated/

Online 'museum' displays collection of the finest spam...

As if you haven't already seen enough...
As if you haven't already seen enough... A British man has set up his own Museum of Spam. Considering spam to be 'as much a part of contemporary culture as just about anything… https://www.virusbulletin.com/blog/2004/10/online-museum-displays-collection-finest-spam/

Action plan on spam

15 countries sign up to international action plan on spam.
15 countries sign up to international action plan on spam. A total of 15 countries have signed up to the London Action Plan - an international action plan designed to encourage… https://www.virusbulletin.com/blog/2004/10/action-plan-spam/

Top ten security urban legends revealed

Most common cyber security myths unveiled as part of Cyber Security Month.
Most common cyber security myths unveiled as part of Cyber Security Month. Secure Computing has revealed the 'top ten cyber security urban legends' as part of Cyber Security… https://www.virusbulletin.com/blog/2004/10/top-ten-security-urban-legends-revealed/

FTC sues spyware outfit

US government begins crack down on spyware.
US government begins crack down on spyware. The US Federal Trade Commission (FTC) has filed a law suit in New Hampshire against an alleged spyware operation.The FTC filed the… https://www.virusbulletin.com/blog/2004/10/ftc-sues-spyware-outfit/

Conference photos

Take a look at the VB2004 conference photos
Take a look at the VB2004 conference photos The VB2004 conference photos are now online and available for viewing.If you would like to contribute a selection of your VB2004… https://www.virusbulletin.com/blog/2004/10/conference-photos/

Another successful VB conference

With over 330 delegates and a collection of interesting and informative speakers, VB2004 was a great success.
With over 330 delegates and a collection of interesting and informative speakers, VB2004 was a great success. This year's VB conference, held in the beautiful city of Chicago,… https://www.virusbulletin.com/blog/2004/10/another-successful-vb-conference/

MessageLabs teams up with Symantec

Companies collaborate to provide anti-spam services.
Companies collaborate to provide anti-spam services. Email security firm MessageLabs and security company Symantec have announced that they will combine their anti-spam… https://www.virusbulletin.com/blog/2004/10/messagelabs-teams-symantec/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/10/

Symantec to block phishing

Symantec announces new service to help stop phishing scams
Symantec announces new service to help stop phishing scams Anti-virus and anti-spam vendor Symantec has announced a new service to help identify and block phishing scams. The… https://www.virusbulletin.com/blog/2004/09/symantec-block-phishing/

IETF rejects sender ID

The Internet Engineering Task Force has rejected Microsoft's preferred anti-spam specification.
The Internet Engineering Task Force has rejected Microsoft's preferred anti-spam specification. The Internet Engineering Task Force (IETF) has rejected Microsoft's preferred… https://www.virusbulletin.com/blog/2004/09/ietf-rejects-sender-id/

Governments urged to do more to combat cybercrime

The Council of Europe's 2001 Cybercrime Convention has been signed by 30 countries, but is only law in eight of these.
The Council of Europe's 2001 Cybercrime Convention has been signed by 30 countries, but is only law in eight of these. The message at a conference organized by the Council of… https://www.virusbulletin.com/blog/2004/09/governments-urged-do-more-combat-cybercrime/

Correction

VB regrets that an error slipped through the editorial net in the August 2004 Netware comparative review.
VB regrets that an error slipped through the editorial net in the August 2004 Netware comparative review. VB regrets that an error slipped through the editorial net in the August… https://www.virusbulletin.com/blog/2004/09/correction/

Increase in infections for chinese

87.9% Thats the number of malware infected computer users in China, according to their Minister of Public Security.
87.9% Thats the number of malware infected computer users in China, according to their Minister of Public Security. According to China's Ministry of Public Security, 87.9 per… https://www.virusbulletin.com/blog/2004/09/increase-infections-chinese/

Symantec Buys Again

The AV company that never seems to stop buying, reveals its latest purchase.
The AV company that never seems to stop buying, reveals its latest purchase. Symantec, the AV company that never seems to stop shopping, has revealed its latest purchase: digital… https://www.virusbulletin.com/blog/2004/09/symantec-buys-again/

The bounty hunters are here

US Federal Trade Commission says the US government must be generous with its rewards if it decides to encourage 'bounty hunters' to track down email spammers
US Federal Trade Commission says the US government must be generous with its rewards if it decides to encourage 'bounty hunters' to track down email spammers In a report to… https://www.virusbulletin.com/blog/2004/09/bounty-hunters-are-here/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/09/

Phish it yourself

Do-it-yourself phishing kits are available free of charge to anyone surfing the Internet.
Do-it-yourself phishing kits are available free of charge to anyone surfing the Internet.Do-it-yourself phishing kits are available free of charge to anyone surfing the Internet… https://www.virusbulletin.com/blog/2004/08/phish-it-yourself/

Virginian law is constitutional

US judge rules Virginia’s anti-spam law is constitutional.
US judge rules Virginia’s anti-spam law is constitutional. A judge in the US has ruled that Virginia’s anti-spam law is constitutional. Back in May this year VB reported that the… https://www.virusbulletin.com/blog/2004/08/virginian-law-constitutional/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.