VB Blog

Paying a malware ransom is bad, but telling people never to do it is unhelpful advice

Posted by   Martijn Grooten on   Apr 26, 2016

The current ransomware plague is one of the worst threats the Internet has seen and it is unlikely to go away any time soon. But telling people to never pay the ransom is unhelpful advice.

Read more  

VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers

Posted by   Martijn Grooten on   Apr 22, 2016

In his VB2015 paper, Martin Korman presented his 'VolatilyBot' tool, which extracts malicious code from packed binaries, leveraging the functionality of the Volatility Framework.

Read more  

VB2016 programme announced, registration opened

Posted by   Martijn Grooten on   Apr 21, 2016

We have announced 37 papers (and four reserve papers) that will be presented at VB2016 in Denver, Colorado, USA in October. Registration for the conference has opened; make sure you register before 1 July to benefit from a 10% early bird discount.

Read more  

New tool helps ransomware victims indentify the malware family

Posted by   Martijn Grooten on   Apr 15, 2016

The people behind the MalwareHunterTeam have released a tool that helps victims of ransomware identify which of more than 50 families has infected their system, something which could help them find a tool to decrypt their files.

Read more  

It's fine for vulnerabilities to have names — we just need not to take them too seriously

Posted by   Martijn Grooten on   Apr 13, 2016

The PR campaign around the Badlock vulnerability backfired when it turned out that the vulnerability wasn't as serious as had been suggested. But naming vulnerabilities can actually be helpful and certainly shouldn't hurt.

Read more  

Throwback Thursday: The Number of the Beasts

Posted by   Helen Martin on   Apr 7, 2016

The Virus Bulletin Virus Prevalence Table, which ran from 1992 until 2013, gave users a regular snapshot of what was really going on in the virus (and later malware) world, recording the number of incidents of each virus reported to VB in the preceding month. In August 2000, Denis Zenkin, a self-confessed virus prevalence table junkie, shared his findings following a study of the virus prevalence tables over the preceding few years, allowing him to determine the top ten viruses of the period, the top viruses by type and the viruses of the year.

Read more  

Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings

Posted by   Martijn Grooten on   Mar 30, 2016

Security researcher Andreas Lindh recently found a vulnerability in Apache OpenMeetings that could allow remote code execution on a vulnerable server. Andreas reported the vulnerability to the OpenMeetings developers and, once it had been patched, he wrote up the details.

Read more  

Throwback Thursday: 'In the Beginning was the Word...'

Posted by   Helen Martin on   Mar 24, 2016

Word and Excel’s internal file formats used to be something in which few were interested – until macro viruses came along and changed all that. In 1996, Andrew Krukov provided an overview of the new breed of viruses.

Read more  

VB2016 Call for Papers Deadline

Posted by   Martijn Grooten on   Mar 18, 2016

You have until the early hours (GMT) of Monday 21 March to submit an abstract for VB2016! The VB2016 programme will be announced in the first week of April.

Read more  

How broken is SHA-1 really?

Posted by   Martijn Grooten on   Mar 15, 2016

SHA-1 collisions may be found in the next few months, but that doesn't mean that fake SHA-1-based certificates will be created in the near future. Nevertheless, it is time for everyone, and those working in security in particular, to move away from outdated hash functions.

Read more  

Search blog

Study promotes challenge-response for anti-spam

Interactive system rated best blocker in questioned survey.
Interactive system rated best blocker in questioned survey. A study of anti-spam systems, using a bespoke scale to rate protection offered, has found the challenge-response method… https://www.virusbulletin.com/blog/2007/07/study-promotes-challenge-response-anti-spam/

Ransomware returns

Trojan hides personal data, demands money with menaces.
Trojan hides personal data, demands money with menaces. A new version of a ransomware trojan has been sighted, recalling the warnings of two years ago when similar items first… https://www.virusbulletin.com/blog/2007/07/ransomware-returns/

MessageLabs may be next takeover target

Managed services provider thought ripe for acquisition.
Managed services provider thought ripe for acquisition. Managed security specialist MessageLabs has been labelled a likely candidate for takeover by one of the industry giants, in… https://www.virusbulletin.com/blog/2007/07/messagelabs-may-be-next-takeover-target/

Microsoft files adware system patent

Ads could be targeted at users based on local system data.
Ads could be targeted at users based on local system data.Microsoft has filed a patent application for a new method of targeting advertising, using information on the contents of a… https://www.virusbulletin.com/blog/2007/07/microsoft-files-adware-system-patent/

Sony sues maker of MediaMax DRM system

CD protection developer accused of damaging Sony name.
CD protection developer accused of damaging Sony name.Sony BMG, the division of the Sony group embroiled in a long-running scandal after releasing a number of CDs using suspect… https://www.virusbulletin.com/blog/2007/07/sony-sues-maker-mediamax-drm-system/

Japan to tighten spam laws

Proposals to further restrict email and phone spamming.
Proposals to further restrict email and phone spamming. The Japanese Internal Affairs and Communications Ministry is planning a series of improvements to current anti-spam… https://www.virusbulletin.com/blog/2007/07/japan-tighten-spam-laws/

26 phishing arrests in Italy

Police swoop on Poste Italiane spam scam gangs.
Police swoop on Poste Italiane spam scam gangs. In a first for Italy, the Guardia Di Finanza has made 26 arrests from two separate groups of phishing fraudsters, in the culmination… https://www.virusbulletin.com/blog/2007/07/26-phishing-arrests-italy/

Security industry future looks solid, say analysts

Reports predict revenues will continue rising.
Reports predict revenues will continue rising. Analyst firm Global Industry Analysts (GIA) has released its latest report on the future of the IT security market, predicting… https://www.virusbulletin.com/blog/2007/07/security-industry-future-looks-solid-say-analysts/

Microsoft opens security 'portal'

New site carries prevalence data, updates and malware resources.
New site carries prevalence data, updates and malware resources. Security teams at Microsoft have been busy this week, with the full unveiling of the Microsoft Malware Protection… https://www.virusbulletin.com/blog/2007/07/microsoft-opens-security-portal/

Symantec, AVG suffer problems

Vulnerabilities and false positives strike major products.
Vulnerabilities and false positives strike major products.Symantec users have been warned of some serious issues with archive handling, across a wide range of software produced by… https://www.virusbulletin.com/blog/2007/07/symantec-avg-suffer-problems/

7 flaws fixed in July Patch Tuesday release

Critical patches issued for Excel, Active Directory and .NET.
Critical patches issued for Excel, Active Directory and .NET.Microsoft has released a total of seven patches in its monthly 'Patch Tuesday' security update, with three of the… https://www.virusbulletin.com/blog/2007/07/7-flaws-fixed-july-patch-tuesday-release/

SEC brings case against pump-and-dump spammers

Scam spotted after spammed mail sent to SEC lawyer.
Scam spotted after spammed mail sent to SEC lawyer. Two men from Texas have been charged with a range of spam and fraud offences after a 20-month campaign using botnets to spam… https://www.virusbulletin.com/blog/2007/07/sec-brings-case-against-pump-and-dump-spammers/

Controversy over IE-to-Firefox exploit

MS and Mozilla in row over blame for cross-browser attack.
MS and Mozilla in row over blame for cross-browser attack. An exploit which involves browsing to a malicious website using Internet Explorer, but then launches an attack via a… https://www.virusbulletin.com/blog/2007/07/controversy-over-ie-firefox-exploit/

Spoof Spamhaus ads spammed out

Mail campaign claims to promote spam fighters.
Mail campaign claims to promote spam fighters. Spam-fighting organisation Spamhaus has been subjected to an attack on its reputation this week, with a sizeable campaign of spams… https://www.virusbulletin.com/blog/2007/07/spoof-spamhaus-ads-spammed-out/

Fake malware infection alerts spammed out

Latest spam run masquerades as malware warning and fix.
Latest spam run masquerades as malware warning and fix. The group behind last week's Fourth of July spams are thought to be behind another campaign this week, with messages… https://www.virusbulletin.com/blog/2007/07/fake-malware-infection-alerts-spammed-out/

Google buys Postini

Managed security service snapped up by giant.
Managed security service snapped up by giant. Ever-expanding web giant Google has continued its growth into both security and software-as-service spheres with the $625 million… https://www.virusbulletin.com/blog/2007/07/google-buys-postini/

Trojan using webmail to send spam

Captcha systems possibly cracked to automate account creation.
Captcha systems possibly cracked to automate account creation.BitDefender has reported a new trojan attempting to bypass security measures on leading webmail systems Hotmail and… https://www.virusbulletin.com/blog/2007/07/trojan-using-webmail-send-spam/

Kaspersky sues Rising

Feuding AV firms to fight it out in court.
Feuding AV firms to fight it out in court.Kaspersky's Chinese subsidiary has brought a court case against local rival Rising, after an escalating war of words between the two… https://www.virusbulletin.com/blog/2007/07/kaspersky-sues-rising/

Fourth of July targeted by trojan spam

Celebration card emails carry links to malware.
Celebration card emails carry links to malware. A further wave of greetings-card spam has been widely seeded, in the wake of considerable Storm Worm activity in the last week, with… https://www.virusbulletin.com/blog/2007/07/fourth-july-targeted-trojan-spam/

Battle over Blackberry spyware threat

Spy tool for popular device claims to be legitimate.
Spy tool for popular device claims to be legitimate. The expansion of the FlexiSpy mobile device snooping software, originally available only for the Symbian platform but with… https://www.virusbulletin.com/blog/2007/07/battle-over-blackberry-spyware-threat/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.