VB Blog

VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks

Posted by   Martijn Grooten on   Dec 18, 2019

Today we publish the VB2019 paper by Anurag Shandilya (K7 Computing) who looked at recent malware attacks against routers, as well as the video of his presentation in London.

Read more  

Parting thoughts 1: cybersecurity as a social science

Posted by   Martijn Grooten on   Dec 17, 2019

In the first of a five-part series of blog post, departing VB Editor Martijn Grooten explains why he believes cybersecurity isn't as much as technical field as we like to believe.

Read more  

VB2020 call for papers - now open!

Posted by   Martijn Grooten on   Dec 16, 2019

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2020 is now open and we want to hear from you!

Read more  

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Posted by   Martijn Grooten on   Dec 13, 2019

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

Read more  

VB2019 paper: A study of Machete cyber espionage operations in Latin America

Posted by   Martijn Grooten on   Dec 10, 2019

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the analysis of one of its tools, known as Machete. Today we publish their paper and the recording of their presentation.

Read more  

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

Posted by   Helen Martin on   Dec 5, 2019

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to surveillance in current legal debates. Today we publish both their paper and the recording of Miriam presenting the paper in London.

Read more  

VB2019 paper: Oops! It happened again!

Posted by   Helen Martin on   Dec 3, 2019

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Read more  

Job vacancy at VB: Security Evangelist

Posted by   Martijn Grooten on   Nov 29, 2019

Virus Bulletin is recruiting for a person to be the public face of the company

Read more  

VB2019 video: Thwarting Emotet email conversation thread hijacking with clustering

Posted by   Martijn Grooten on   Nov 29, 2019

At VB2019 in London, ZEROSPAM researchers Pierre-Luc Vaudry and Olivier Coutu discussed how email clustering could be used to detect malicious Emotet emails that hijacked existing email threads. Today we publish the recording of their presentation.

Read more  

VB2019 paper: A vine climbing over the Great Firewall: a long-term attack against China

Posted by   Martijn Grooten on   Nov 28, 2019

Today we publish a VB2019 paper from Lion Gu and Bowen Pan from the Qi An Xin Threat Intelligence Center in China in which they analysed an APT group dubbed 'Poison Vine', which targeted various government, military and research institutes in China.

Read more  

Search blog

2003

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsUS and UK spam legislation in place Anti-spam legislation in place. 29 December 2003Number crunchingCalculating the average cost of a virus attack - estimates or guesstimates?… https://www.virusbulletin.com/blog/2003/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2003/01/

Stocks, viruses and a disgruntled employee

A systems administrator has been charged with attempting to manipulate a company's stock price by introducing a virus into its computer system.
A systems administrator has been charged with attempting to manipulate a company's stock price by introducing a virus into its computer system. The New York Times reports that a… https://www.virusbulletin.com/blog/2002/12/stocks-viruses-and-disgruntled-employee/

Stocking Fillers

It's that time of year again when we're frantically scouring the shopping malls for something unique and meaningful to give to our loved ones. Coincidentally, it's also that time of year when VB turns out its stock cupboards and puts some truly fabulous m…
It's that time of year again when we're frantically scouring the shopping malls for something unique and meaningful to give to our loved ones. Coincidentally, it's also that time… https://www.virusbulletin.com/blog/2002/12/stocking-fillers/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2002/12/

Addendum: Windows 2000 Advanced Server Comparative Review

After re-testing, Trend's ServerProtect product gains a VB 100% award.
After re-testing, Trend's ServerProtect product gains a VB 100% award. In the November 2002 Comparative Review Trend's ServerProtect was reported to have failed to achieve full… https://www.virusbulletin.com/blog/2002/12/addendum-windows-2000-advanced-server-comparative-review/

Some thoughts on ViraLock

We examine ViraLock, a product which promises 'Zero Escape For Email Viruses', provided, it seems, the virus plays by their rules.
We examine ViraLock, a product which promises 'Zero Escape For Email Viruses', provided, it seems, the virus plays by their rules. It's understandable that we greet announcements… https://www.virusbulletin.com/blog/2002/11/some-thoughts-viralock/

Who's There?

New security portal unveiled by publishers of Information Security Bulletin magazine.
New security portal unveiled by publishers of Information Security Bulletin magazine. Last month a new security portal was unveiled by the publishers of Information Security… https://www.virusbulletin.com/blog/2002/11/who-s-there/

Paying the Price

McAfee Security issues press release estimating the potential costs to businesses of 'the next big virus attack'
McAfee Security issues press release estimating the potential costs to businesses of 'the next big virus attack' McAfee Security has become the latest security company to issue a… https://www.virusbulletin.com/blog/2002/11/paying-price/

Writer of virus trio in court

A British man has appeared in court charged with the creation and distribution of a trio of mass-mailing viruses: Gokar, Redesi and Admirer.
A British man has appeared in court charged with the creation and distribution of a trio of mass-mailing viruses: Gokar, Redesi and Admirer. A British man has appeared in court… https://www.virusbulletin.com/blog/2002/11/writer-virus-trio-court/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2002/11/

'Kournikova' writer loses appeal

Reports are that Jan de Wit, author of the 'Kournikova' virus (VBSWG variant) has lost his appeal against 150 hours of community service.
Reports are that Jan de Wit, author of the 'Kournikova' virus (VBSWG variant) has lost his appeal against 150 hours of community service. The Register reports that Jan de Wit,… https://www.virusbulletin.com/blog/2002/10/kournikova-writer-loses-appeal/

With friends like these...

A nuisance email which is neither viral nor a hoax is proving to be equally bothersome.
A nuisance email which is neither viral nor a hoax is proving to be equally bothersome. A nuisance email which is neither viral nor a hoax is proving to be equally bothersome.… https://www.virusbulletin.com/blog/2002/10/friends-these/

Addendum: June 2002 Windows XP Comparative Review

F-Prot users relying on the on-access protection against W32/Nimda.A are safe
F-Prot users relying on the on-access protection against W32/Nimda.A are safe In the June 2002 comparative review of anti-virus products for Windows XP (see VB, June 2002, p.19),… https://www.virusbulletin.com/blog/2002/10/addendum-june-2002-windows-xp-comparative-review/

Moth-eaten software...

A warning issued by Israeli security firm GreyMagic Software last month revealed a total of nine vulnerabilities in IE 5.5 and 6.0, all concerning object caching.
A warning issued by Israeli security firm GreyMagic Software last month revealed a total of nine vulnerabilities in IE 5.5 and 6.0, all concerning object caching. A warning… https://www.virusbulletin.com/blog/2002/10/moth-eaten-software/

Service or bust

So confident is Trend Micro of its virus detection abilities that it is offering a financial penalty-backed detection guarantee.
So confident is Trend Micro of its virus detection abilities that it is offering a financial penalty-backed detection guarantee. So confident is Trend Micro of its virus detection… https://www.virusbulletin.com/blog/2002/10/service-or-bust/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2002/10/

Viruses - Some Good

Just occasionally, a virus infection can have some positive effects...
Just occasionally, a virus infection can have some positive effects... Much like biological viruses, it turns out that infections by computer viruses can lead to increased measures… https://www.virusbulletin.com/blog/2002/09/viruses-some-good/

Bring on the DEET

The latest award for the most tenuous product-pushing story goes to BitDefender, whose marketeers claim a 'mosquito-borne disease could easily become a computer infection.'
The latest award for the most tenuous product-pushing story goes to BitDefender, whose marketeers claim a 'mosquito-borne disease could easily become a computer infection.' The… https://www.virusbulletin.com/blog/2002/09/bring-deet/

Virtually There

The Infosecurity show and exhibition has gone virtual with the launch of the first Infosecurity World Online exhibition. But where are the sweets?
The Infosecurity show and exhibition has gone virtual with the launch of the first Infosecurity World Online exhibition. But where are the sweets? The Infosecurity show and… https://www.virusbulletin.com/blog/2002/09/virtually-there/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.