VB Blog

Security-conscious processors

Posted by   Virus Bulletin on   Jan 12, 2004

AMD and Intel prep technology to prevent buffer overflows at the hardware level.

Read more  

US and UK spam legislation in place

Posted by   Virus Bulletin on   Dec 29, 2003

Anti-spam legislation in place.

Read more  

Number crunching

Posted by   Virus Bulletin on   Dec 19, 2003

Calculating the average cost of a virus attack - estimates or guesstimates?

Read more  

SAS - the SysAsmin Service?

Posted by   Virus Bulletin on   Dec 18, 2003

Computer security experts prepare to become special constables.

Read more  

SpamCop snapped up

Posted by   Virus Bulletin on   Dec 1, 2003

IronPort Systems to purchase SpamCop

Read more  

Seasonal spamming

Posted by   Virus Bulletin on   Dec 1, 2003

Increase in spam in lead up to holiday season.

Read more  

VB2004 call for papers

Posted by   Virus Bulletin on   Nov 15, 2003

Virus Bulletin calls for all speakers papers.

Read more  

The menace within

Posted by   Virus Bulletin on   Nov 4, 2003

Is BitDefender really staffed by Romanian vampire hackers...?

Read more  

Unanimous vote for CAN-SPAM Act

Posted by   Virus Bulletin on   Nov 1, 2003

US Senate approves federal anti-spam legislation.

Read more  

New VB Spam Supplement

Posted by   Virus Bulletin on   Nov 1, 2003

VB plans to present a selection of news and articles on spam and anti-spam techniques - some technical, some ethical, some relating to real-world experiences of dealing with spam.

Read more  

Search blog

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/10/

VB2015 'Steganoprague' competition

Use your steganography-detection skills and win a pile of books.
Use your steganography-detection skills and win a pile of books. As VB2015 is about to begin, we announce the second part of the 'Steganoprague' competition. In this part, you will… https://www.virusbulletin.com/blog/2015/09/steganoprague-competition/

Throwback Thursday: The First International Virus Bulletin Conference

This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey. With VB2015, the 25th Virus Bulletin… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-first-international-conference/

Researchers seek ransomware samples for their generic solution

VB2015 presentation to include demonstration of technique against recent samples.
VB2015 presentation to include demonstration of technique against recent samples. 'The scary hack that's on the rise' is how Wired's Kim Zetter described ransomware in an overview… https://www.virusbulletin.com/blog/2015/09/researchers-seek-ransomware-samples-their-generic-solution/

Throwback Thursday: Virus Writer and Distributors 'Attributable Viruses'

This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses. This week saw the confession of a… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-virus-writer-and-distributors-attributable-viruses/

VB2015 last-minute papers announced

Ten talks covering hot research added to the VB2015 programme.
Ten talks covering hot research added to the VB2015 programme. There are just over two weeks to go until more than 400 security professionals descend on Prague for VB2015, the 25th… https://www.virusbulletin.com/blog/2015/09/last-minute-papers-announced/

Paper: Custom packer defeats multiple automation systems

Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder.
Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder. Ever since the number of new malware samples became so large we could no… https://www.virusbulletin.com/blog/2015/09/paper-custom-packer-defeats-multiple-automation-systems/

Throwback Thursday: Computer Viruses: Electronically Transmitted Disease?

This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses.
This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses. One could… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-computer-viruses-electronically-transmitted-disease/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/09/

VB2015: some important information

Last-minute papers, steganography competition and foosball tournament.
Last-minute papers, steganography competition and foosball tournament. We're just a little over a month away from the beginning of VB2015, the 25th Virus Bulletin International… https://www.virusbulletin.com/blog/2015/08/some-important-information/

Throwback Thursday: Safe Hex in the 21st Century

This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough.
This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough. How many times have we heard commentators… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-safe-hex-21st-century/

Paper: Not a GAMe maKER

Raul Alvarez performs low-level analysis of information-stealing trojan.
Raul Alvarez performs low-level analysis of information-stealing trojan. The Gamker information-stealing trojan (also known as Shiz) has been around for a few years. It made the… https://www.virusbulletin.com/blog/2015/08/paper-not-game-maker/

VB2015 preview: advanced persistent threats

Several conference papers to deal with targeted attacks.
Several conference papers to deal with targeted attacks. There was a time when analyses of malware and viruses at the Virus Bulletin conference used the number of infections as a… https://www.virusbulletin.com/blog/2015/08/preview-advanced-persistent-threats/

Throwback Thursday: The Virus Analyst Headache

This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity and volume of viruses was proving a headache.
This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-virus-analyst-headache/

Back to the future: anti-virus engines and sandboxes

Szilard Stange makes the case for multi-engine malware scanning.
Szilard Stange makes the case for multi-engine malware scanning.The VB2015 conference takes place next month (30 September to 2 October) in Prague, with an exciting programme that… https://www.virusbulletin.com/blog/2015/08/back-future-anti-virus-engines-and-sandboxes/

Catch rates bounce back in latest spam filter test

Products defy prediction of tougher circumstances.
Products defy prediction of tougher circumstances. When spam levels were recently reported to have dropped below 50% for the first time in 12 years, I wrote that it was 'not… https://www.virusbulletin.com/blog/2015/08/catch-rates-bounce-back-latest-spam-filter-test/

Paper: Life after the apocalypse for the Middle Eastern NJRat campaign

Malware authors upped their game following 2014 disruption of No-IP.
Malware authors upped their game following 2014 disruption of No-IP. In June last year, somewhat controversially Microsoft moved against dynamic DNS provider No-IP and seized 22 of… https://www.virusbulletin.com/blog/2015/08/paper-life-after-apocalypse-middle-eastern-njrat-campaign/

Throwback Thursday: IT Security Breaches: The 1994 NCC Survey

This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost?
This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost? Year after year, we see… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-it-security-breaches-1994-ncc-survey/

VB2015 preview: the Internet of Things

Experts to cover various aspects of IoT (in)security in a range of talks.
Experts to cover various aspects of IoT (in)security in a range of talks. As a reader of this blog, and hopefully as someone who will attend VB2015, you don't need to be told that… https://www.virusbulletin.com/blog/2015/08/preview-internet-things/

File-stealing vulnerability found in Firefox PDF reader

Both Windows and Linux users actively being targeted.
Both Windows and Linux users actively being targeted. If, like me, you are suffering from vulnerability fatigue after so many flaws and weaknesses having been disclosed in Las… https://www.virusbulletin.com/blog/2015/08/file-stealing-vulnerability-found-firefox-pdf-reader/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.