VB Blog

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to Android security, the Tor Project, and exploit kits.

Read more  

Research shows web security products perform well against exploit kits

Posted by   Martijn Grooten on   Aug 24, 2016

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Read more  

Search blog

MIME tricks beat email virus scanners

Simple encoding dodges slip malware past gateways.
Simple encoding dodges slip malware past gateways. A security researcher released a report last week claiming that some simple manipulation allowed him to get mails containing the… https://www.virusbulletin.com/blog/2006/12/mime-tricks-beat-email-virus-scanners/

Smartphone security sphere to reach $5 billion by 2011

Market analysts foresee boom in mobile threats and security market.
Market analysts foresee boom in mobile threats and security market. UK-based telecoms analyst Juniper Research has released a report predicting a steady rise in attacks on… https://www.virusbulletin.com/blog/2006/12/smartphone-security-sphere-reach-5-billion-2011/

Adobe hit by second vulnerability

More document software security worries.
More document software security worries. PDF software giant Adobe has released details of its second vulnerability in little over a week. The first, which was discovered in the… https://www.virusbulletin.com/blog/2006/12/adobe-hit-second-vulnerability/

Anti-spyware activists condemn rogue MP3 search firm

CDT and StopBadware unite in call for action against spyware pushers.
CDT and StopBadware unite in call for action against spyware pushers. The Center for Democracy and Technology (CDT) and StopBadware.org have issued a joint complaint to the Federal… https://www.virusbulletin.com/blog/2006/12/anti-spyware-activists-condemn-rogue-mp3-search-firm/

Trojan spreading mobile spyware

Consumer phone-snooping tool dropped by Symbian malware.
Consumer phone-snooping tool dropped by Symbian malware. A new variant of the MultiDropper trojan targeting Symbian smartphones has included amongst its payload a 'legitimate'… https://www.virusbulletin.com/blog/2006/12/trojan-spreading-mobile-spyware/

Free firewalls rated best in leak tests

Leakage review puts Comodo, Jetico way ahead of field.
Leakage review puts Comodo, Jetico way ahead of field. An in-depth study subjecting 23 different personal firewall products to a range of leak tests has granted two free products,… https://www.virusbulletin.com/blog/2006/12/free-firewalls-rated-best-leak-tests/

Mobile spam wave hits Europe

Multilingual SMS spams reported.
Multilingual SMS spams reported. Mobile security researchers at F-Secure have received numerous reports of SMS spams from across Europe, in a variety of languages. Links in the… https://www.virusbulletin.com/blog/2006/12/mobile-spam-wave-hits-europe/

MS Word zero-day exploit seen in wild

Microsoft warns of attacks using vulnerability.
Microsoft warns of attacks using vulnerability.Microsoft has issued a security bulletin warning of a serious vulnerability discovered in several versions of Microsoft Word and… https://www.virusbulletin.com/blog/2006/12/ms-word-zero-day-exploit-seen-wild/

EU to fund Symantec phishing studies

Security firm in consortium researching phishing prevention.
Security firm in consortium researching phishing prevention.Symantec announced yesterday an award of funding from the European Commission to pay for research into securing email… https://www.virusbulletin.com/blog/2006/12/eu-fund-symantec-phishing-studies/

MySpace hit by worm, adware and phishing

Exploit in QuickTime file infecting social site profile pages.
Exploit in QuickTime file infecting social site profile pages. A malicious QuickTime movie file is spreading across social networking site MySpace, embedding itself in the user… https://www.virusbulletin.com/blog/2006/12/myspace-hit-worm-adware-and-phishing/

Firm charged $1 million in rogue spyware case

Heavy fines and fees hit fake 'Spyware Cleaner' pushers.
Heavy fines and fees hit fake 'Spyware Cleaner' pushers. A Seattle court has announced a $1 million settlement in a case brought against a spyware firm, marking the first… https://www.virusbulletin.com/blog/2006/12/firm-charged-1-million-rogue-spyware-case/

China source of huge phishing surge

Spam watchers see major jump in scam spam sent from China
Spam watchers see major jump in scam spam sent from China Analysts at email and web security firm Marshal have reported a major spike in the numbers of phishing email originating… https://www.virusbulletin.com/blog/2006/12/china-source-huge-phishing-surge/

Vista launched, malware still a danger

New Windows version on sale, but viruses remain a threat, says Sophos
New Windows version on sale, but viruses remain a threat, says Sophos The corporate version Microsoft's long-awaited update to its Windows operating system was finally released… https://www.virusbulletin.com/blog/2006/12/vista-launched-malware-still-danger/

In the picture?

Remember VB94?
Remember VB94? Were you at VB94 in Jersey? VB has unearthed some photos taken at the fourth Virus Bulletin Conference. To see those who were the fresh faces of the anti-virus… https://www.virusbulletin.com/blog/2006/12/picture/

Stocking filler

Collection of 419 baiting tales.
Collection of 419 baiting tales. If you're stuck for a last-minute Christmas gift idea, Mike Berry's new book could be the answer. Mike Berry is the creator of 'scam-baiting'… https://www.virusbulletin.com/blog/2006/12/stocking-filler/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/12/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2006 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2006/12/december-issue-vb-published/

Festive greetings

Yuletide wishes.
Yuletide wishes. The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous and peaceful new year. This year, continuing the tradition of its Christmas… https://www.virusbulletin.com/blog/2006/12/festive-greetings/

Anti-spammer loses case

Anti-spam activist sued in case that brings enforceability of state anti-spam laws into question.
Anti-spam activist sued in case that brings enforceability of state anti-spam laws into question. An anti-spam activist has successfully been sued in a US federal court by the… https://www.virusbulletin.com/blog/2006/12/anti-spammer-loses-case/

Vulnerability hits F-Secure gateway products

Flaw in OpenSSL could allow DoS on servers.
Flaw in OpenSSL could allow DoS on servers. A vulnerability in OpenSSL software, used to access the administration interface in some F-Secure gateway and mail protection products,… https://www.virusbulletin.com/blog/2006/11/vulnerability-hits-f-secure-gateway-products/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.