VB Blog

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to Android security, the Tor Project, and exploit kits.

Read more  

Research shows web security products perform well against exploit kits

Posted by   Martijn Grooten on   Aug 24, 2016

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Read more  

Search blog

Users of online banking 'should have adequate protection'

New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft.
New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft. A new banking code launched earlier this week by the British'… https://www.virusbulletin.com/blog/2008/04/users-online-banking-should-have-adequate-protection/

Less than 30 per cent of smartphone users have AV installed

Experts disagree on the need for specialist mobile AV protection.
Experts disagree on the need for specialist mobile AV protection. In a poll only 19% of visitors to the VB website said they had anti-malware protection on their mobile phone.… https://www.virusbulletin.com/blog/2008/04/less-30-cent-smartphone-users-have-av-installed/

Average spam message size at record low

No decrease of bandwidth usage as number of spam messages keeps increasing.
No decrease of bandwidth usage as number of spam messages keeps increasing. The average size of spam messages has decreased to a record low of just over 2KB, security company… https://www.virusbulletin.com/blog/2008/04/average-spam-message-size-record-low/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/04/april-issue-vb-published/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2008/04/

Almost 90% of Americans feel safe online

Users' confidence does not match up with percentage of properly protected users.
Users' confidence does not match up with percentage of properly protected users. Research by StopBadware.org shows that 88% of Americans say they feel safe online, despite the… https://www.virusbulletin.com/blog/2008/04/almost-90-americans-feel-safe-online/

April Storm

April Fools' Day emails contain new variant of infamous worm.
April Fools' Day emails contain new variant of infamous worm. Security researchers report a new wave of spam emails being sent out. The emails, which use subject lines such as… https://www.virusbulletin.com/blog/2008/04/april-storm/

From Simple Mail to Hypertext

HTTP and FTP take over from SMTP as common malware spreading methods.
HTTP and FTP take over from SMTP as common malware spreading methods.A report from F-Secure has highlighted the recent shift in malware spreading methods from email to web-based… https://www.virusbulletin.com/blog/2008/03/simple-mail-hypertext/

Access flaw exploited via Word

Microsoft's employees hunting vulnerabilities instead of Easter eggs.
Microsoft's employees hunting vulnerabilities instead of Easter eggs. A buffer overrun vulnerability in Microsoft's Jet Database Engine, the underlying database behind Microsoft… https://www.virusbulletin.com/blog/2008/03/access-flaw-exploited-word/

Microsoft acquires Komoku

Anti-rootkit software to become part of Forefront and OneCare.
Anti-rootkit software to become part of Forefront and OneCare. Just before Easter, Microsoft announced it had acquired Komoku, a Maryland-based company that builds anti-rootkit… https://www.virusbulletin.com/blog/2008/03/microsoft-acquires-komoku/

Legitimate program becomes trojan downloader

Website of FlashGet attacked; malicious 'update' automatically downloaded.
Website of FlashGet attacked; malicious 'update' automatically downloaded. By hacking into the website of popular Windows download manager FlashGet, cybercriminals have managed to… https://www.virusbulletin.com/blog/2008/03/legitimate-program-becomes-trojan-downloader/

Hoax email warns about 'nasty virus'

Phony advice causes removal of site from search engines.
Phony advice causes removal of site from search engines. Over the last few days an email, written in German, has been seen circulating warning users about a 'nasty virus' that is… https://www.virusbulletin.com/blog/2008/03/hoax-email-warns-about-nasty-virus/

More 'trusted sites' carrying iframe danger

Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim.
Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim. Earlier this week McAfee reported a major outbreak of website infections, with as… https://www.virusbulletin.com/blog/2008/03/more-trusted-sites-carrying-iframe-danger/

AV-test.org issues latest figures

In-depth testing covers multiple factors.
In-depth testing covers multiple factors. Independent testing body AV-Test.org has released its latest set of results, with a large group of products tested against a number of… https://www.virusbulletin.com/blog/2008/03/av-test-org-issues-latest-figures/

EU agency research advises sweeping security improvements

ISPs and developers should be held to account, says report.
ISPs and developers should be held to account, says report. A research paper commissioned by the European Network and Information Security Agency (ENISA) has called for major… https://www.virusbulletin.com/blog/2008/03/eu-agency-research-advises-sweeping-security-improvements/

Latest Patch Tuesday release

March's Patch Tuesday sees four 'critical' updates.
March's Patch Tuesday sees four 'critical' updates.Microsoft has released its monthly 'Patch Tuesday' security bulletin. This month the bulletin features four 'critical' updates,… https://www.virusbulletin.com/blog/2008/03/latest-patch-tuesday-release/

Latest AV-Comparatives results released

Detection test shows most products improving.
Detection test shows most products improving. Testers at AV-Comparatives have released their latest set of results, with 16 products pitted against a massive set of over 1.6… https://www.virusbulletin.com/blog/2008/03/latest-av-comparatives-results-released/

Cisco announces 'Patch Wednesdays'

Cisco set to embark on regular release cycle.
Cisco set to embark on regular release cycle. Following a trend set by Microsoft's monthly 'Patch Tuesdays' and Oracle's quarterly security updates, networking giant Cisco has… https://www.virusbulletin.com/blog/2008/03/cisco-announces-patch-wednesdays/

'Olympic' emails contain malicious XLS attachments

Malware writers sprint to use vulnerabilities before next Patch Tuesday.
Malware writers sprint to use vulnerabilities before next Patch Tuesday. Security researchers have reported seeing emails containing XLS attachments designed to exploit a yet… https://www.virusbulletin.com/blog/2008/03/olympic-emails-contain-malicious-xls-attachments/

Spammer's free speech defence fails

Appeal against conviction turned down.
Appeal against conviction turned down. US spammer Jeremy Jaynes, the first spammer convicted in a felony case, has had his last appeal against the conviction, brought on freedom of… https://www.virusbulletin.com/blog/2008/03/spammer-s-free-speech-defence-fails/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.