VB Blog

VB2017 preview: Calling all PUA fighters

Posted by   Martijn Grooten on   Aug 31, 2017

We preview the VB2017 Small Talk to be given by AppEsteem's Dennis Batchelder that should help security vendors make decisions about apps whose behaviours sit right on the limits of what is acceptable from a security point of view.

Read more  

VB2017 preview: From insider threat to insider asset: a practical guide

Posted by   Martijn Grooten on   Aug 30, 2017

We preview the VB2017 paper by Forcepoint's Kristin Leary and Richard Ford, who will discuss a practical approach to preventing insider attacks.

Read more  

WireX DDoS botnet takedown shows the best side of the security industry

Posted by   Martijn Grooten on   Aug 29, 2017

Collaboration between a number of security companies has led to the takedown of the WireX Android DDoS botnet. Efforts like these, and the fact that the companies involved all decided to publish the very same blog post, show the best side of the security industry.

Read more  

VB2017 preview: Your role in child abuse

Posted by   Martijn Grooten on   Aug 28, 2017

We preview the VB2017 presentation by Mick Moran, who will discuss online child abuse and the role the security community can play fighting it.

Read more  

ROPEMAKER email exploit is of limited practical use

Posted by   Martijn Grooten on   Aug 28, 2017

Researchers at Mimecast have published a paper about the 'ROPEMAKER' exploit, which allows an email sender with malicious intentions to change the visial appearance of an email after it has been delivered.

Read more  

VB2017 preview: Mariachis and jackpotting: ATM malware from Latin America

Posted by   Martijn Grooten on   Aug 25, 2017

We preview the VB2017 presentation by Kaspersky Lab researchers Thiago Marques and Fabio Assolini in which they look at malware targeting ATMs in Latin America.

Read more  

VB2017 preview: Stuck between a ROC and a hard place

Posted by   Martijn Grooten on   Aug 24, 2017

We preview the VB2017 paper by Microsoft's Holly Stewart and Joe Blackbird, which uses data about users switching anti-virus provider to decide whether machine-learning models should favour avoiding false positives over false negatives.

Read more  

VB2017 preview: Consequences of bad security in health care

Posted by   Martijn Grooten on   Aug 23, 2017

We preview the VB2017 presentation by Jelena Milosevic, an ICU nurse by profession, who will provide the audience with an inside view of security in hospitals.

Read more  

VB2017 Small Talk: The encryption vs. inspection debate

Posted by   Martijn Grooten on   Aug 22, 2017

At VB2017, Cloudflare's Head of Cryptography Nick Sullivan will give a Small Talk on the intercepting of HTTPS connections by proxies and anti-virus software.

Read more  

Throwback Thursday: Ten memorable Virus Bulletin conference presentations - part 2

Posted by   Virus Bulletin on   Aug 10, 2017

In the second part of this two-part blog series, we look at five more memorable Virus Bulletin conference presentations.

Read more  

Search blog

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/10/

VB2015 'Steganoprague' competition

Use your steganography-detection skills and win a pile of books.
Use your steganography-detection skills and win a pile of books. As VB2015 is about to begin, we announce the second part of the 'Steganoprague' competition. In this part, you will… https://www.virusbulletin.com/blog/2015/09/steganoprague-competition/

Throwback Thursday: The First International Virus Bulletin Conference

This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey. With VB2015, the 25th Virus Bulletin… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-first-international-conference/

Researchers seek ransomware samples for their generic solution

VB2015 presentation to include demonstration of technique against recent samples.
VB2015 presentation to include demonstration of technique against recent samples. 'The scary hack that's on the rise' is how Wired's Kim Zetter described ransomware in an overview… https://www.virusbulletin.com/blog/2015/09/researchers-seek-ransomware-samples-their-generic-solution/

Throwback Thursday: Virus Writer and Distributors 'Attributable Viruses'

This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses. This week saw the confession of a… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-virus-writer-and-distributors-attributable-viruses/

VB2015 last-minute papers announced

Ten talks covering hot research added to the VB2015 programme.
Ten talks covering hot research added to the VB2015 programme. There are just over two weeks to go until more than 400 security professionals descend on Prague for VB2015, the 25th… https://www.virusbulletin.com/blog/2015/09/last-minute-papers-announced/

Paper: Custom packer defeats multiple automation systems

Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder.
Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder. Ever since the number of new malware samples became so large we could no… https://www.virusbulletin.com/blog/2015/09/paper-custom-packer-defeats-multiple-automation-systems/

Throwback Thursday: Computer Viruses: Electronically Transmitted Disease?

This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses.
This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses. One could… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-computer-viruses-electronically-transmitted-disease/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/09/

VB2015: some important information

Last-minute papers, steganography competition and foosball tournament.
Last-minute papers, steganography competition and foosball tournament. We're just a little over a month away from the beginning of VB2015, the 25th Virus Bulletin International… https://www.virusbulletin.com/blog/2015/08/some-important-information/

Throwback Thursday: Safe Hex in the 21st Century

This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough.
This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough. How many times have we heard commentators… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-safe-hex-21st-century/

Paper: Not a GAMe maKER

Raul Alvarez performs low-level analysis of information-stealing trojan.
Raul Alvarez performs low-level analysis of information-stealing trojan. The Gamker information-stealing trojan (also known as Shiz) has been around for a few years. It made the… https://www.virusbulletin.com/blog/2015/08/paper-not-game-maker/

VB2015 preview: advanced persistent threats

Several conference papers to deal with targeted attacks.
Several conference papers to deal with targeted attacks. There was a time when analyses of malware and viruses at the Virus Bulletin conference used the number of infections as a… https://www.virusbulletin.com/blog/2015/08/preview-advanced-persistent-threats/

Throwback Thursday: The Virus Analyst Headache

This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity and volume of viruses was proving a headache.
This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-virus-analyst-headache/

Back to the future: anti-virus engines and sandboxes

Szilard Stange makes the case for multi-engine malware scanning.
Szilard Stange makes the case for multi-engine malware scanning.The VB2015 conference takes place next month (30 September to 2 October) in Prague, with an exciting programme that… https://www.virusbulletin.com/blog/2015/08/back-future-anti-virus-engines-and-sandboxes/

Catch rates bounce back in latest spam filter test

Products defy prediction of tougher circumstances.
Products defy prediction of tougher circumstances. When spam levels were recently reported to have dropped below 50% for the first time in 12 years, I wrote that it was 'not… https://www.virusbulletin.com/blog/2015/08/catch-rates-bounce-back-latest-spam-filter-test/

Paper: Life after the apocalypse for the Middle Eastern NJRat campaign

Malware authors upped their game following 2014 disruption of No-IP.
Malware authors upped their game following 2014 disruption of No-IP. In June last year, somewhat controversially Microsoft moved against dynamic DNS provider No-IP and seized 22 of… https://www.virusbulletin.com/blog/2015/08/paper-life-after-apocalypse-middle-eastern-njrat-campaign/

Throwback Thursday: IT Security Breaches: The 1994 NCC Survey

This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost?
This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost? Year after year, we see… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-it-security-breaches-1994-ncc-survey/

VB2015 preview: the Internet of Things

Experts to cover various aspects of IoT (in)security in a range of talks.
Experts to cover various aspects of IoT (in)security in a range of talks. As a reader of this blog, and hopefully as someone who will attend VB2015, you don't need to be told that… https://www.virusbulletin.com/blog/2015/08/preview-internet-things/

File-stealing vulnerability found in Firefox PDF reader

Both Windows and Linux users actively being targeted.
Both Windows and Linux users actively being targeted. If, like me, you are suffering from vulnerability fatigue after so many flaws and weaknesses having been disclosed in Las… https://www.virusbulletin.com/blog/2015/08/file-stealing-vulnerability-found-firefox-pdf-reader/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.