VB Blog

Avast to present technical details of CCleaner hack at VB2017

Posted by   Martijn Grooten on   Oct 2, 2017

The recently discovered malicious CCleaner version has become one of the biggest security stories of 2017. Two researchers from Avast, the company that had recently acquired CCleaner developer Piriform, will share the results of their investigations at VB2017 in Madrid this week.

Read more  

VB2017 preview: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Posted by   Martijn Grooten on   Oct 2, 2017

We preview the VB2017 paper by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Costin Raiu on fourth-party collection and its implications for attack attribution.

Read more  

VB2017 preview: Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server

Posted by   Martijn Grooten on   Sep 29, 2017

We preview Patrick Wardle's VB2017 paper, in which the Synack researcher analyses the mysterious OSX/FruitFly malware by setting up a custom C&C server.

Read more  

VB2017 - information for press

Posted by   Martijn Grooten on   Sep 28, 2017

More than 50 security industry experts will present conference papers to their peers at VB2017 next week, and there are several papers on the programme with a certain newsworthiness. There is still time for cybersecurity journalists to apply for a press pass.

Read more  

VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

We preview the VB2017 paper by Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) who combine an actor-centric and a network-centric approach to analysing bulletproof hosting operations.

Read more  

Test your technical and mental limits in the VB2017 foosball tournament

Posted by   Martijn Grooten on   Sep 22, 2017

As has become tradition, VB2017 will once again see a security industry table football tournament. Register your team now for some great fun and adrenaline-filled matches in between sessions in Madrid!

Read more  

The case against running Windows XP is more subtle than we think it is

Posted by   Martijn Grooten on   Sep 21, 2017

Greater Manchester Police is one of many organizations still running Windows XP on some of its systems. This is bad practice, but the case against running XP is far more subtle than we often pretend it is.

Read more  

Hot FinSpy research completes VB2017 programme

Posted by   Martijn Grooten on   Sep 21, 2017

Researchers from ESET have found a new way in which the FinSpy/FinFisher 'government spyware' can infect users, details of which they will present at VB2017 in Madrid.

Read more  

Transparency is essential when monitoring your users' activities

Posted by   Virus Bulletin on   Sep 20, 2017

Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

Read more  

VB2017 preview: Android reverse engineering tools: not the usual suspects

Posted by   Martijn Grooten on   Sep 19, 2017

We preview the VB2017 paper by Fortinet researcher Axelle Apvrille, in which she looks at some less obvious tools for reverse engineering Android malware.

Read more  

Search blog

Users of online banking 'should have adequate protection'

New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft.
New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft. A new banking code launched earlier this week by the British'… https://www.virusbulletin.com/blog/2008/04/users-online-banking-should-have-adequate-protection/

Average spam message size at record low

No decrease of bandwidth usage as number of spam messages keeps increasing.
No decrease of bandwidth usage as number of spam messages keeps increasing. The average size of spam messages has decreased to a record low of just over 2KB, security company… https://www.virusbulletin.com/blog/2008/04/average-spam-message-size-record-low/

Less than 30 per cent of smartphone users have AV installed

Experts disagree on the need for specialist mobile AV protection.
Experts disagree on the need for specialist mobile AV protection. In a poll only 19% of visitors to the VB website said they had anti-malware protection on their mobile phone.… https://www.virusbulletin.com/blog/2008/04/less-30-cent-smartphone-users-have-av-installed/

Almost 90% of Americans feel safe online

Users' confidence does not match up with percentage of properly protected users.
Users' confidence does not match up with percentage of properly protected users. Research by StopBadware.org shows that 88% of Americans say they feel safe online, despite the… https://www.virusbulletin.com/blog/2008/04/almost-90-americans-feel-safe-online/

April Storm

April Fools' Day emails contain new variant of infamous worm.
April Fools' Day emails contain new variant of infamous worm. Security researchers report a new wave of spam emails being sent out. The emails, which use subject lines such as… https://www.virusbulletin.com/blog/2008/04/april-storm/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/04/april-issue-vb-published/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2008/04/

From Simple Mail to Hypertext

HTTP and FTP take over from SMTP as common malware spreading methods.
HTTP and FTP take over from SMTP as common malware spreading methods.A report from F-Secure has highlighted the recent shift in malware spreading methods from email to web-based… https://www.virusbulletin.com/blog/2008/03/simple-mail-hypertext/

Access flaw exploited via Word

Microsoft's employees hunting vulnerabilities instead of Easter eggs.
Microsoft's employees hunting vulnerabilities instead of Easter eggs. A buffer overrun vulnerability in Microsoft's Jet Database Engine, the underlying database behind Microsoft… https://www.virusbulletin.com/blog/2008/03/access-flaw-exploited-word/

Microsoft acquires Komoku

Anti-rootkit software to become part of Forefront and OneCare.
Anti-rootkit software to become part of Forefront and OneCare. Just before Easter, Microsoft announced it had acquired Komoku, a Maryland-based company that builds anti-rootkit… https://www.virusbulletin.com/blog/2008/03/microsoft-acquires-komoku/

Hoax email warns about 'nasty virus'

Phony advice causes removal of site from search engines.
Phony advice causes removal of site from search engines. Over the last few days an email, written in German, has been seen circulating warning users about a 'nasty virus' that is… https://www.virusbulletin.com/blog/2008/03/hoax-email-warns-about-nasty-virus/

Legitimate program becomes trojan downloader

Website of FlashGet attacked; malicious 'update' automatically downloaded.
Website of FlashGet attacked; malicious 'update' automatically downloaded. By hacking into the website of popular Windows download manager FlashGet, cybercriminals have managed to… https://www.virusbulletin.com/blog/2008/03/legitimate-program-becomes-trojan-downloader/

More 'trusted sites' carrying iframe danger

Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim.
Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim. Earlier this week McAfee reported a major outbreak of website infections, with as… https://www.virusbulletin.com/blog/2008/03/more-trusted-sites-carrying-iframe-danger/

EU agency research advises sweeping security improvements

ISPs and developers should be held to account, says report.
ISPs and developers should be held to account, says report. A research paper commissioned by the European Network and Information Security Agency (ENISA) has called for major… https://www.virusbulletin.com/blog/2008/03/eu-agency-research-advises-sweeping-security-improvements/

AV-test.org issues latest figures

In-depth testing covers multiple factors.
In-depth testing covers multiple factors. Independent testing body AV-Test.org has released its latest set of results, with a large group of products tested against a number of… https://www.virusbulletin.com/blog/2008/03/av-test-org-issues-latest-figures/

Latest Patch Tuesday release

March's Patch Tuesday sees four 'critical' updates.
March's Patch Tuesday sees four 'critical' updates.Microsoft has released its monthly 'Patch Tuesday' security bulletin. This month the bulletin features four 'critical' updates,… https://www.virusbulletin.com/blog/2008/03/latest-patch-tuesday-release/

Cisco announces 'Patch Wednesdays'

Cisco set to embark on regular release cycle.
Cisco set to embark on regular release cycle. Following a trend set by Microsoft's monthly 'Patch Tuesdays' and Oracle's quarterly security updates, networking giant Cisco has… https://www.virusbulletin.com/blog/2008/03/cisco-announces-patch-wednesdays/

Latest AV-Comparatives results released

Detection test shows most products improving.
Detection test shows most products improving. Testers at AV-Comparatives have released their latest set of results, with 16 products pitted against a massive set of over 1.6… https://www.virusbulletin.com/blog/2008/03/latest-av-comparatives-results-released/

'Olympic' emails contain malicious XLS attachments

Malware writers sprint to use vulnerabilities before next Patch Tuesday.
Malware writers sprint to use vulnerabilities before next Patch Tuesday. Security researchers have reported seeing emails containing XLS attachments designed to exploit a yet… https://www.virusbulletin.com/blog/2008/03/olympic-emails-contain-malicious-xls-attachments/

IE8 to include malware filtering

New features list includes upgrade to security provision.
New features list includes upgrade to security provision. The next version of Microsoft's Internet Explorer web browser, IE8, could include malware detection as standard, in an… https://www.virusbulletin.com/blog/2008/03/ie8-include-malware-filtering/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.