VB Blog

Partner with VB2018 for extra visibility among industry peers

Posted by   Martijn Grooten on   Mar 8, 2018

Partnering with the VB conference links your company to a successful and well-established event, demonstrates your commitment to moving the industry forward, allows you to meet potential clients, be visible to industry peers and build lasting connections.

Read more  

VB2017 paper: The router of all evil

Posted by   Martijn Grooten on   Mar 7, 2018

At VB2017 in Madrid, security researcher Himanshu Anand presented a paper on malware that targets routers, looking both at the topic in general and at some individual case studies. Today we publish both the paper (co-written with Chastine Menrige) and the recording of Himanshu's presentation.

Read more  

Using Mailchimp makes malware campaigns a little bit more successful

Posted by   Martijn Grooten on   Mar 6, 2018

In recent months, some malicious spam campaigns have been spreading via the systems of Mailchimp, a well-known email service provider - a tactic which may give the campaigns a slightly higher success rate.

Read more  

VB2017 video: The state of cybersecurity in Africa: Kenya

Posted by   Martijn Grooten on   Mar 1, 2018

Though many of the IT security issues we face are global, there is a noticeable difference in the threats faced in various countries and regions, as well as in the ways they are dealt with. At VB2017, we heard from Tyrus Kamau about the state of cybersecurity in Kenya. Today, we publish the video of Tyrus's talk.

Read more  

A crime against statistics that is probably worse than the cyber attacks faced in County Durham

Posted by   Martijn Grooten on   Feb 21, 2018

A report on the number of cyber attacks faced by UK local authorities is a good example of how the large numbers seen in many reports on security are rather meaningless.

Read more  

NCSC gives important advice on lateral movement

Posted by   Martijn Grooten on   Feb 20, 2018

The UK's National Cyber Security Centre (NCSC) has provided helpful and practical advice on preventing and detecting lateral movement by an attacker within a network.

Read more  

What kind of people attend Virus Bulletin conferences?

Posted by   Martijn Grooten on   Feb 17, 2018

If you are considering submitting a proposal for a talk to VB2018 and you're not familiar with the event, you may find it useful to know what kind of people attend the conference.

Read more  

Olympic Games target of malware, again

Posted by   Martijn Grooten on   Feb 15, 2018

An unattributed malware attack has disrupted some computer systems of the 2018 Winter Olympics. In 1994, a computer virus also targeted the Winter Olympics.

Read more  

There are lessons to be learned from government websites serving cryptocurrency miners

Posted by   Martijn Grooten on   Feb 12, 2018

Thousands of websites, including many sites of government organisations in the UK, the US and Sweden, were recently found to have been serving a cryptocurrency miner. More interesting than the incident itself, though, are the lessons that can be learned from it.

Read more  

We need to continue the debate on the ethics and perils of publishing security research

Posted by   Martijn Grooten on   Feb 9, 2018

An article by security researcher Collin Anderson reopens the debate on whether publishing threat analyses is always in the public interest.

Read more  

Search blog

Vulnerability reported in IE

ActiveX flaw opens another hole in MS browser.
ActiveX flaw opens another hole in MS browser. Yet another bug has been found in Microsoft's browser Internet Explorer, only days after a previous problem was patched for the third… https://www.virusbulletin.com/blog/2006/09/vulnerability-reported-ie/

Symantec hit by vulnerabilities

Two flaws in alert handling unveiled.
Two flaws in alert handling unveiled. Two separate vulnerabilites in the alert notification handling systems of Symantec products have been reported this week. Symantec Client… https://www.virusbulletin.com/blog/2006/09/symantec-hit-vulnerabilities/

Chain letter email reaps addresses

Fake research a harvesting trick by spammers.
Fake research a harvesting trick by spammers. An email widely spammed out in recent days claiming to be part of a research project into email use is in fact a scam designed to… https://www.virusbulletin.com/blog/2006/09/chain-letter-email-reaps-addresses/

Spamhaus fined $11.7 million for blocking spam

US judgement meaningless, says UK anti-spam project.
US judgement meaningless, says UK anti-spam project. An Illinois court has passed a judgement demanding UK-based spam advisory organisation Spamhaus pay $11.7 million in damages to… https://www.virusbulletin.com/blog/2006/09/spamhaus-fined-11-7-million-blocking-spam/

ISP wins $11 million from spammers

Judgement in EarthLink lawsuit grants heavy payout.
Judgement in EarthLink lawsuit grants heavy payout. US ISP giant EarthLink, a regular champion of the CAN-SPAM Act, has won yet another case against a spammer. The judgement passed… https://www.virusbulletin.com/blog/2006/09/isp-wins-11-million-spammers/

Sony DRM/AOL combo breaks computers

Anti-spyware tool attacks rootkit, kills CD drive.
Anti-spyware tool attacks rootkit, kills CD drive. An alert has been issued by the Office of the Attorney General of Texas, warning that an anti-spyware product from AOL has a… https://www.virusbulletin.com/blog/2006/09/sony-drm-aol-combo-breaks-computers/

Patch Tuesday light on patches

MS patches previous patches, but not Word exploit.
MS patches previous patches, but not Word exploit.Microsoft's monthly 'Patch Tuesday' release of security fixes has been relatively quiet, with only three new bugs repaired, in… https://www.virusbulletin.com/blog/2006/09/patch-tuesday-light-patches/

Barclays phish spammed widely

64% of recent phishes targeting global brand.
64% of recent phishes targeting global brand. Reports from Panda Software warn of a major phishing campaign targeting users of Barclays online banking, causing a 30% rise in… https://www.virusbulletin.com/blog/2006/09/barclays-phish-spammed-widely/

Star sites host most malware

Celebrities bigger lure than sex, says McAfee.
Celebrities bigger lure than sex, says McAfee. A report on adware and spyware from McAfee has stated that celebrity sites, rather than those pushing pornography or other widely… https://www.virusbulletin.com/blog/2006/09/star-sites-host-most-malware/

Zotob authors jailed

One year, two years for worm writing duo.
One year, two years for worm writing duo. Courts in Morocco have convicted two men accused of having a hand in the creation and distribution of the 'Zotob' worm, which struck… https://www.virusbulletin.com/blog/2006/09/zotob-authors-jailed/

Fake news site carries trojan

Conspiracy warning spam points to exploit web page.
Conspiracy warning spam points to exploit web page. A spam campaign is directing Australian readers to a faked news site designed to drop a trojan. The initial mails carry a stark… https://www.virusbulletin.com/blog/2006/09/fake-news-site-carries-trojan/

Phishing records broken in July

Highest ever numbers of phishing sites and brands, reports APWG.
Highest ever numbers of phishing sites and brands, reports APWG. 154 brands were recorded as targets for phishing attempts in July, according to the Anti Phishing Working Group… https://www.virusbulletin.com/blog/2006/09/phishing-records-broken-july/

Spearphishers track eBay trades

Auction losers tempted by second-chance phishes.
Auction losers tempted by second-chance phishes. As part of the general trend of more focused phishing, users of online auction house eBay are reporting phishes directly targeting… https://www.virusbulletin.com/blog/2006/09/spearphishers-track-ebay-trades/

Botnet keepers rake in adware cash

Zombie herder makes $430 per day from single piece of adware.
Zombie herder makes $430 per day from single piece of adware. According to research by the German Honeynet Project, a botnet controller who installed adware including DollarRevenue… https://www.virusbulletin.com/blog/2006/09/botnet-keepers-rake-adware-cash/

More AV products suffer flaws

Vulnerabilities found in AntiVir and avast!.
Vulnerabilities found in AntiVir and avast!. Security defects in two anti-virus products have been reported by security watch company Secunia in the last week. While the AntiVir… https://www.virusbulletin.com/blog/2006/09/more-av-products-suffer-flaws/

Samsung site hosting malware

Websense reports trojans found on electronics giant's servers.
Websense reports trojans found on electronics giant's servers. A US-hosted website belonging to Samsung Telecommunications America, a subsidiary of South Korean electronics giant… https://www.virusbulletin.com/blog/2006/09/samsung-site-hosting-malware/

Zango not guilty on spyware charges

Spyware bad, adware OK, says court.
Spyware bad, adware OK, says court. Adware-supported 'online media company' Zango has had accusations of using spyware dashed by a Chicago, Illinois court. The class action case,… https://www.virusbulletin.com/blog/2006/09/zango-not-guilty-spyware-charges/

Phishers cast nets less wide

More scams hitting fewer targets, says report.
More scams hitting fewer targets, says report. According to RSA Security's August report on online fraud, the number of brands attacked by phishing scams fell by 20% last month,… https://www.virusbulletin.com/blog/2006/09/phishers-cast-nets-less-wide/

'Magic Quadrant' study unveiled

AV industry future revealed - must do better.
AV industry future revealed - must do better. Industry analyst and predictor Gartner has released its annual 'Magic Quadrant' study of the current state and likely future of the AV… https://www.virusbulletin.com/blog/2006/09/magic-quadrant-study-unveiled/

MS sues UK spammer

Civil action avoids spam law technicalities.
Civil action avoids spam law technicalities.Microsoft has sued and reached an out-of-court settlement with UK spammer Paul Fox, after apparently despairing of finding any success… https://www.virusbulletin.com/blog/2006/09/ms-sues-uk-spammer/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.