VB Blog

VB2018 preview: Explain Ethereum smart contract hacking like I am five

Posted by   Martijn Grooten on   Aug 28, 2018

Designing smart contracts is hard: we preview a VB2018 paper on the blockchain-based platform Ethereum, that describes both how the technology works and how a number of security issues inherent to the platform have led to various high-profile and often very costly hacks.

Read more  

VB2017 video: Client Maximus raises the bar

Posted by   Martijn Grooten on   Aug 27, 2018

At VB2017, IBM Trusteer researcher Omer Agmon, presented a 'last-minute' paper in which he analysed the Client Maximum trojan, which targets Brazilian users of online banking. Today, we release the recording of his presentation.

Read more  

The security industry is genuinely willing to help you do good work

Posted by   Martijn Grooten on   Aug 21, 2018

For those organizations working for the public good, security vendors are often willing to offer their services for free, or for very low cost.

Read more  

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

Posted by   Martijn Grooten on   Aug 17, 2018

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

Read more  

VB2018 preview: From drive-by download to drive-by mining

Posted by   Martijn Grooten on   Aug 15, 2018

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Read more  

Red Eyes threat group targets North Korean defectors

Posted by   Martijn Grooten on   Aug 14, 2018

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on North Korea.

Read more  

VB announces Threat Intelligence Summit to take place during VB2018

Posted by   Martijn Grooten on   Aug 9, 2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

Read more  

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

Posted by   Martijn Grooten on   Aug 7, 2018

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

Read more  

VB2018 call for last-minute papers opened

Posted by   Martijn Grooten on   Jul 27, 2018

The call for last-minute papers for VB2018 is now open. Submit before 2 September to have your abstract considered for one of the nine slots reserved for 'hot' research.

Read more  

VB2017 paper and update: Browser attack points still abused by banking trojans

Posted by   Martijn Grooten on   Jul 25, 2018

At VB2017, ESET researchers Peter Kálnai and Michal Poslušný looked at how banking malware interacts with browsers. Today we publish their paper, share the video of their presentation, and also publish a guest blog post from Peter, in which he summarises the recent developments in this space.

Read more  

Search blog

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/01/january-issue-vb-published/

FTC notes malicious spam on the rise

FTC reports on a decade of spam fighting.
FTC reports on a decade of spam fighting. The US Federal Trade Commission (FTC) has released a report reflecting on the ten years in which it has been involved in the fight… https://www.virusbulletin.com/blog/2008/01/ftc-notes-malicious-spam-rise/

All in the name

Grisoft becomes AVG.
Grisoft becomes AVG. Last month, Czech firm Grisoft, developer of widely used anti-malware product AVG, changed its corporate name to AVG Technologies CZ, s.r.o. Having operated… https://www.virusbulletin.com/blog/2008/01/all-name/

No taste for spam?

ICANN takes steps to combat domain tasting.
ICANN takes steps to combat domain tasting. The practice of domain tasting, often used by spammers and other shady types to register tens of thousands of Internet domain names at… https://www.virusbulletin.com/blog/2008/01/no-taste-spam/

Prolific spammer indicted

Notorious spammer Alan Ralsky charged with spamming and stock fraud.
Notorious spammer Alan Ralsky charged with spamming and stock fraud. Infamous prolific spammer Alan Ralsky has been indicted over his alleged involvement in an international… https://www.virusbulletin.com/blog/2008/01/prolific-spammer-indicted/

2008

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsMS to release out-of-band patch for critical IE vulnerabilityUsers advised to patch ASAP. 17 December 2008IE zero-day danger growingLarge numbers of users vulnerable to… https://www.virusbulletin.com/blog/2008/

Magic lanterns shine at terrorists

Virus Bulletin finds 40% of users think governments should write viruses to bug terrorists.
Virus Bulletin finds 40% of users think governments should write viruses to bug terrorists.In a survey of visitors to the Virus Bulletin website, 40% of computer users said they… https://www.virusbulletin.com/blog/2007/12/magic-lanterns-shine-terrorists/

Zero-day exploit for Japanese word processor Ichitaro

Trend Micro notes increase in regionally targeted attacks as trojan becomes latest to exploit a Ichitaro flaw.
Trend Micro notes increase in regionally targeted attacks as trojan becomes latest to exploit a Ichitaro flaw. A trojan has been found to be exploiting a buffer overflow… https://www.virusbulletin.com/blog/2007/12/zero-day-exploit-japanese-word-processor-ichitaro/

$3.2 billion lost in phishing attacks in 2007

Gartner survey reveals US losses to phishing gangs.
Gartner survey reveals US losses to phishing gangs. Analyst firm Gartner has estimated that $3.2 billion was lost by 3.6 million US computer users in phishing attacks over the 12… https://www.virusbulletin.com/blog/2007/12/3-2-billion-lost-phishing-attacks-2007/

Survey finds 75% lose trust in data-loss firms

Security breaches seriously undermining public respect.
Security breaches seriously undermining public respect. A survey carried out jointly by security company Check Point and research firm YouGov has found public reaction to data… https://www.virusbulletin.com/blog/2007/12/survey-finds-75-lose-trust-data-loss-firms/

Latest VB100 announced

Windows Server 2003 products to be tested.
Windows Server 2003 products to be tested. VB has issued a call for submissions for the latest VB100 comparative review, which will measure the performance of products for the… https://www.virusbulletin.com/blog/2007/12/latest-announced/

VB100 update

Several issues resulting from recent Windows 2000 test cleared up.
Several issues resulting from recent Windows 2000 test cleared up. After a busy and drama-filled VB100 month, several issues arising from the test have been subject to further… https://www.virusbulletin.com/blog/2007/12/update/

Four IE bugs fixed by Patch Tuesday release

Seven updates, three critical in monthly security update.
Seven updates, three critical in monthly security update.Microsoft has released its monthly 'Patch Tuesday' security bulletin, featuring seven updates of which three are marked… https://www.virusbulletin.com/blog/2007/12/four-ie-bugs-fixed-patch-tuesday-release/

Cyber attackers breach defences at secret US labs

Spearphishing and trojans penetrate research lab security.
Spearphishing and trojans penetrate research lab security. At least one major US science lab, used to handle highly classified government and military material, has had its… https://www.virusbulletin.com/blog/2007/12/cyber-attackers-breach-defences-secret-us-labs/

UK spooks spooked by possible Chinese hacking

MI5 warns of suspected corporate espionage onslaught.
MI5 warns of suspected corporate espionage onslaught. The UK security service MI5 has issued an alert to 300 leading firms, warning them to ensure best possible security measures… https://www.virusbulletin.com/blog/2007/12/uk-spooks-spooked-possible-chinese-hacking/

Grisoft acquires Exploit Prevention Labs

AVG to incorporate LinkScanner in further consolidation of security offerings.
AVG to incorporate LinkScanner in further consolidation of security offerings.Grisoft, developer of the AVG security product whose free version is widely deployed on home-user… https://www.virusbulletin.com/blog/2007/12/grisoft-acquires-exploit-prevention-labs/

Vista fails to reassure web users

50% of users don't believe Vista has made the Internet any safer.
50% of users don't believe Vista has made the Internet any safer. According to a recent poll, 50% of visitors to the VB website do not believe that Windows Vista has made the… https://www.virusbulletin.com/blog/2007/12/vista-fails-reassure-web-users/

Yuletide greetings

Festive wishes.
Festive wishes. The members of the VB team extend their warm wishes to Virus Bulletin readers for a very happy holiday season and a healthy and prosperous new year. This Christmas… https://www.virusbulletin.com/blog/2007/12/yuletide-greetings/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/12/

Botnet roasting on an open fire

FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008.
FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008. The FBI has revealed that eight individuals have been indicted, pled guilty or been… https://www.virusbulletin.com/blog/2007/12/botnet-roasting-open-fire/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.