VB Blog

When it comes to online banking, sub-optimal encryption isn't our biggest concern

Posted by   Virus Bulletin on   Jan 6, 2016

Malware authors and scammers won't attack the crypto.

Read more  

Malware likely cause of power cut in Ukraine

Posted by   Virus Bulletin on   Jan 5, 2016

BlackEnergy malware previously linked to targeted attacks in the country.

Read more  

Call for Papers: VB2016 Denver

Posted by   Virus Bulletin on   Dec 22, 2015

VB seeks submissions for the 26th Virus Bulletin Conference.

Read more  

VB2015 video: Making a dent in Russian mobile banking phishing

Posted by   Virus Bulletin on   Dec 16, 2015

Sebastian Porst explains what Google has done to protect users from phishing apps targeting Russian banks.

Read more  

Conference review: Botconf 2015

Posted by   Virus Bulletin on   Dec 15, 2015

Third botnet fighting conference another big success.

Read more  

High spam catch rates continue in latest spam filter test

Posted by   Virus Bulletin on   Dec 14, 2015

US presidential candidates regularly see their emails blocked by spam filters.

Read more  

Throwback Thursday: A View from the Lab

Posted by   Virus Bulletin on   Dec 3, 2015

This Throwback Thursday, VB heads back to 1997 with 'A View from the Lab'.

Read more  

Paper: Optimizing ssDeep for use at scale

Posted by   Virus Bulletin on   Nov 27, 2015

Brian Wallace presents tool to optimize ssDeep comparisons.

Read more  

Throwback Thursday: Legal attempts to reduce spam. A UK perspective

Posted by   Virus Bulletin on   Nov 19, 2015

This Throwback Thursday, we turn the clock back to November 2003, when spam was such a hot topic that VB decided to launch a dedicated 'VB Spam Supplement'.

Read more  

Paper: 3ROS exploit framework kit — one more for the infection road

Posted by   Virus Bulletin on   Nov 13, 2015

Aditya K. Sood and Rohit Bansal highlight a different side of an exploit kit.

Read more  

Search blog

Paper: Hype heuristics, signatures and the death of AV (again)

David Harley responds to anti-malware's many criticasters.
David Harley responds to anti-malware's many criticasters. Anti-virus is dead. After all, in the current threat landscape, who would use a system that relies on signatures of… https://www.virusbulletin.com/blog/2015/08/paper-hype-heuristics-signatures-and-death-av-again/

Throwback Thursday: Palm Breach

This Throwback Thursday, we turn the clock back to July 2000, when concerns were growing about malicious threats to the Palm Personal Digital Assistant.
This Throwback Thursday, we turn the clock back to July 2000, when concerns were growing about malicious threats to the Palm Personal Digital Assistant. In the 1980s, no one left… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-palm-breach/

August

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/08/

Compromised site serves Nuclear exploit kit together with fake BSOD

Support scammers not lying about a malware infection for a change.
Support scammers not lying about a malware infection for a change. During our work on the development of the VBWeb tests, which will be started soon, we came across an interesting… https://www.virusbulletin.com/blog/2015/07/compromised-site-serves-nuclear-exploit-kit-together-fake-bsod/

Throwback Thursday: Riotous Assembly

This Throwback Thursday, we turn the clock back to January 1994, shortly after Cyber Riot had emerged as the first virus capable of infecting the Windows kernel.
This Throwback Thursday, we turn the clock back to January 1994, shortly after Cyber Riot had emerged as the first virus capable of infecting the Windows kernel. Today, malware… https://www.virusbulletin.com/blog/2015/07/throwback-thursday-riotous-assembly/

Stagefright vulnerability leaves 950 million Android devices vulnerable to remote code execution

The operating system has been patched, but it is unclear whether users will receive those patches.
The operating system has been patched, but it is unclear whether users will receive those patches. Researchers at mobile security firm Zimperium have discovered a remote code… https://www.virusbulletin.com/blog/2015/07/stagefright-vulnerability-leaves-950-million-android-devices-vulnerable-remote-code-execution/

Throwback Thursday: Sizewell B: Fact or Fiction?

This Throwback Thursday, we turn the clock back to 1993, when VB asked the key question: could a virus compromise safety at one of Britain's nuclear power plants?
This Throwback Thursday, we turn the clock back to 1993, when VB asked the key question: could a virus compromise safety at one of Britain's nuclear power plants? 2010 saw the… https://www.virusbulletin.com/blog/2015/07/throwback-thursday-sizewell-b-fact-or-fiction/

Call for last-minute papers for VB2015 announced

Ten speaking slots waiting to be filled with presentations on 'hot' security topics.
Ten speaking slots waiting to be filled with presentations on 'hot' security topics. There's never a dull moment in the world of IT security. Whether you think the breach of… https://www.virusbulletin.com/blog/2015/07/call-last-minute-papers-announced/

Spam levels fall below 50% for the first time in 12 years

Decline not necessarily good news for spam filters.
Decline not necessarily good news for spam filters. For the first time in 12 years, less than half of email traffic is spam, Symantec reports in the latest issue of its monthly… https://www.virusbulletin.com/blog/2015/07/spam-levels-fall-below-50-first-time-12-years/

'NOMORE' attack makes RC4 a little weaker again

No good reason to continue using the stream cipher, yet attacks remain impractical.
No good reason to continue using the stream cipher, yet attacks remain impractical. Researchers from the KU Leuven have presented a new attack against the RC4 stream cipher called… https://www.virusbulletin.com/blog/2015/07/nomore-attack-makes-rc4-little-weaker-again/

Throwback Thursday: What You Pay For...

This Throwback Thursday, we turn the clock back to 1996, when VB looked at what was available to protect your computer free of charge.
This Throwback Thursday, we turn the clock back to 1996, when VB looked at what was available to protect your computer free of charge. Today, the 'freemium' business model is a… https://www.virusbulletin.com/blog/2015/07/throwback-thursday-what-you-pay/

Paper: Dridex in the Wild

Meng Su explains how Dridex works and how it communicates with its C&C server.
Meng Su explains how Dridex works and how it communicates with its C&C server. A descendant of Cridex, Dridex was first written about a little less than a year ago, by S21sec and… https://www.virusbulletin.com/blog/2015/07/paper-dridex-wild/

Those doing bad things deserve privacy too

Hacking Team leakers should have taken a leaf out of Snowden's book.
Hacking Team leakers should have taken a leaf out of Snowden's book. I can understand, at least in principle, that targeted malware could be used by law enforcement agencies for… https://www.virusbulletin.com/blog/2015/07/those-doing-bad-things-deserve-privacy-too/

Throwback Thursday: Cabirn Fever

This Throwback Thursday, we turn the clock back to 2004, when the first worm to spread from mobile phone to mobile phone appeared.
This Throwback Thursday, we turn the clock back to 2004, when the first worm to spread from mobile phone to mobile phone appeared. Since it first appeared almost exactly 11 years… https://www.virusbulletin.com/blog/2015/07/throwback-thursday-cabirn-fever/

Little sympathy for breached Hacking Team

Lists of customers, source code and zero-day vulnerabilities made public.
Lists of customers, source code and zero-day vulnerabilities made public. The biggest security story of this week, and probably one of the biggest of the year, is the hack of… https://www.virusbulletin.com/blog/2015/07/little-sympathy-breached-hacking-team/

Throwback Thursday: The Updating Game

This Throwback Thursday, we turn the clock back to 1997, when automatic updates of AV software were not the norm.
This Throwback Thursday, we turn the clock back to 1997, when automatic updates of AV software were not the norm. We all know that the malware scene has changed almost beyond… https://www.virusbulletin.com/blog/2015/07/throwback-thursday-updating-game/

July

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/07/

Nominations opened for second Péter Ször Award

'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.
'Brilliant mind and a true gentleman' commemorated through annual award for technical security research. During VB2014 in Seattle, we presented the first annual Péter Ször Award to… https://www.virusbulletin.com/blog/2015/06/nominations-opened-second-p-ter-sz-r-award/

VB2014 paper: Quantifying maliciousness in Alexa top-ranked domains

Paul Royal looks at malware served through the most popular websites.
Paul Royal looks at malware served through the most popular websites. Though VB2014 took place nine months ago, most of the papers presented during the conference remain very… https://www.virusbulletin.com/blog/2015/06/paper-quantifying-maliciousness-alexa-top-ranked-domains/

Latest spam filter test sees significant drop in catch rates

Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award.
Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award. Spam is notoriously volatile and thus, while we like to make the news headlines… https://www.virusbulletin.com/blog/2015/06/latest-spam-filter-test-sees-significant-drop-catch-rates/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.