VB Blog

Throwback Thursday: The Politics of Anti-Virus

Posted by   Helen Martin on   Nov 10, 2016

President-elect of the United States Donald Trump made a number of promises about cybersecurity during his electoral campaign. What comes of those pledges remains to be seen, but one thing is certain: there will be a team of hard-working, dedicated individuals working behind the scenes to protect the computer systems of Federal government agencies, as there have been for years. Back in 1999, VB published a report describing a day in the life of the Affiliated Computer Services Government Solutions Group (ACS GSG) - the group responsible for providing full service computer support to US Federal government agencies across the United States.

Read more  

VB2016 paper: The TAO of Automated Iframe Injectors - Building Drive-by Platforms For Fun

Posted by   Martijn Grooten on   Oct 18, 2016

We publish Aditya K. Sood's VB2016 paper on the use of iframe injectors by cybercriminals to deliver drive-by downloads.

Read more  

“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker

Posted by   Virus Bulletin on   Sep 26, 2016

An interview with VB2016’s keynote speaker Christine Whalley - Director, Governance and IT Risk Management at Pfizer

Read more  

Throwback Thursday: Following the Breadcrumbs

Posted by   Helen Martin on   Sep 22, 2016

In 1999, Christine Orshesky described how one large organization decided to find out how and where the viruses within it were being obtained so it could do more to protect its networks.

Read more  

VB2016 preview: Cryptography mistakes in malware

Posted by   Martijn Grooten on   Sep 15, 2016

At VB2016, two talks will discuss mistakes made by malware authors in cryptographic implementations. Ben Herzog and Yaniv Balmas will present a paper in which they look at a number of these mistakes, while Malwarebytes researcher hasherezade will present a last-minute paper on making use of some of these mistakes to crack ransomware.

Read more  

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Posted by   Virus Bulletin on   Sep 14, 2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about GPS, about the conference, and about his ultimate dinner party.

Read more  

BSides Denver: Join and Support the Security Community

Posted by   Martijn Grooten on   Sep 13, 2016

If you are coming to VB2016 in Denver, why not spend an extra day in the Mile-High City and join the free BSides Denver conference, which takes place on Saturday?

Read more  

VB2016 'Last-Minute' Papers Announced

Posted by   Martijn Grooten on   Sep 13, 2016

We are excited to announce the addition of the "last-minute" papers to the VB2016 programme: nine presentations covering hot research topics, from OS X attacks to exotic APTs, breaking ransomware and the current state of BGP.

Read more  

VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

Posted by   Martijn Grooten on   Sep 12, 2016

In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi Talbi will present a paper on Haka, a tool that can be used to monitor and debug malware's network communications.

Read more  

Paper: Behavioural Detection and Prevention of Malware on OS X

Posted by   Martijn Grooten on   Sep 12, 2016

In a new paper published through Virus Bulletin, Vincent Van Mieghem presents a novel method for detecting malware on Mac OS X, based on the system calls used by malicious software.

Read more  

Search blog

Hormel halts Spam King in his tracks

No 'Spam King' clothing line for Richter.
No 'Spam King' clothing line for Richter. Infamous spammer Scott Richter, aka the 'Spam King', has fallen at the first hurdle in his bid to launch a 'Spam King'-branded clothing… https://www.virusbulletin.com/blog/2004/06/hormel-halts-spam-king-his-tracks/

DIY do not spam

Chicago businessman takes matters into his own hands
Chicago businessman takes matters into his own hands Chicago businessman Rocky Mosele has created his own 'do not spam' list. Fed up of the disruptive effect spam was having on… https://www.virusbulletin.com/blog/2004/06/diy-do-not-spam/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/06/

Taiwanese Trojan writer arrested

Suspect not a teenager for a change.
Suspect not a teenager for a change. A Taiwanese engineer has been arrested on suspicion of creating a Trojan horse. Earlier this week, 30-year-old Wang Ping-an was apprehended… https://www.virusbulletin.com/blog/2004/05/taiwanese-trojan-writer-arrested/

Legislation: NZ makes a move

New Zealand government moves toward anti-spam legislation
New Zealand government moves toward anti-spam legislation The government of New Zealand has signalled its intention to bring in anti-spam legislation. A discussion paper released… https://www.virusbulletin.com/blog/2004/05/legislation-nz-makes-move/

German government spammed

Government email systems overwhelmed
Government email systems overwhelmed Barely a month after Germany's ruling Social Democratic Party (SPD) put forward proposals for tough new sanctions for spammers, the German… https://www.virusbulletin.com/blog/2004/05/german-government-spammed/

Cajun spammer tells it like it is

Straight talking spammer
Straight talking spammer A prolific emailer (read spammer) has told the US Senate Commerce Committee that, although the 30 million email messages he sends out each day comply… https://www.virusbulletin.com/blog/2004/05/cajun-spammer-tells-it-it/

Spend, spend, spend for Symantec

Anti-spam company to become AV vendor's latest purchase
Anti-spam company to become AV vendor's latest purchase Just days after revealing that its gateway anti-virus product will stop sending automatic virus notification 'spam' - a… https://www.virusbulletin.com/blog/2004/05/spend-spend-spend-symantec/

No rest for German police

Arrest of suspected Sasser author, arrest of suspected Phatbot author and questioning of five more suspects - all within the space of 7 days.
Arrest of suspected Sasser author, arrest of suspected Phatbot author and questioning of five more suspects - all within the space of 7 days. The German authorities have been busy… https://www.virusbulletin.com/blog/2004/05/no-rest-german-police/

Buying and selling

Trend buys back shares, Sybari prepares to sell
Trend buys back shares, Sybari prepares to sell Trend Micro's board of directors has announced plans to repurchase some of the company's shares from the market. The company will… https://www.virusbulletin.com/blog/2004/05/buying-and-selling/

SpamCop at receiving end of a restraining order

Venerable spam reporting outfit SpamCop has had a restraining order granted against it on behalf of alleged spammer OptInRealBig.com.
Venerable spam reporting outfit SpamCop has had a restraining order granted against it on behalf of alleged spammer OptInRealBig.com. Venerable spam reporting outfit SpamCop has… https://www.virusbulletin.com/blog/2004/05/spamcop-receiving-end-restraining-order/

Figures and fluctuations

Dips, increases and the cost of dealing with spam
Dips, increases and the cost of dealing with spam While the term 'spam' celebrated its tenth birthday last month, MessageLabs reported a decline in the volume of spam seen in… https://www.virusbulletin.com/blog/2004/05/figures-and-fluctuations/

Spam on the catwalk

Spammer extraordinaire launches own clothing line
Spammer extraordinaire launches own clothing line Scott Richter, spammer extraordinaire, is set to launch his own clothing line, according to Newsday . The man who brought to our… https://www.virusbulletin.com/blog/2004/05/spam-catwalk/

Law and order

Spamming set to become illegal in the Netherlands and other legislative news...
Spamming set to become illegal in the Netherlands and other legislative news... Spamming is about to become illegal in The Netherlands, after the upper house of the Dutch… https://www.virusbulletin.com/blog/2004/05/law-and-order/

NAI reverts to McAfee

Network Associates Inc. (NAI) to streamline and adopt (not so) new name.
Network Associates Inc. (NAI) to streamline and adopt (not so) new name. In a bid to reduce costs and increase productivity, Network Associates, Inc. (NAI) has announced plans to… https://www.virusbulletin.com/blog/2004/05/nai-reverts-mcafee/

Call for papers: AVAR 2004

AVAR calls for papers
AVAR calls for papers AVAR (the Association of anti-Virus Asia Researchers) has issued a call for papers for AVAR 2004 in Tokyo, which will take place 25-26 November 2004 in… https://www.virusbulletin.com/blog/2004/05/call-papers-avar-2004/

May

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/05/

Symantec vulnerabilities

eEye reports four new Symantec vulnerabilities
eEye reports four new Symantec vulnerabilities eEye Digital Security has reported that it has discovered four new vulnerabilities affecting Symantec products. Products affected… https://www.virusbulletin.com/blog/2004/04/symantec-vulnerabilities/

Business news

Acquisitions and new product lines
Acquisitions and new product lines UK-based web and email filtering company SurfControl revealed plans last month to acquire California-based email security firm MessageSoft Inc.… https://www.virusbulletin.com/blog/2004/04/business-news/

New sentencing, new legislation

United States Sentencing Commission gets busy...
United States Sentencing Commission gets busy... The United States Sentencing Commission (USSC) — the body tasked with refining the sentencing portions of new legislation — met… https://www.virusbulletin.com/blog/2004/04/new-sentencing-new-legislation/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.