VB Blog

Partner with VB2018 for extra visibility among industry peers

Posted by   Martijn Grooten on   Mar 8, 2018

Partnering with the VB conference links your company to a successful and well-established event, demonstrates your commitment to moving the industry forward, allows you to meet potential clients, be visible to industry peers and build lasting connections.

Read more  

VB2017 paper: The router of all evil

Posted by   Martijn Grooten on   Mar 7, 2018

At VB2017 in Madrid, security researcher Himanshu Anand presented a paper on malware that targets routers, looking both at the topic in general and at some individual case studies. Today we publish both the paper (co-written with Chastine Menrige) and the recording of Himanshu's presentation.

Read more  

Using Mailchimp makes malware campaigns a little bit more successful

Posted by   Martijn Grooten on   Mar 6, 2018

In recent months, some malicious spam campaigns have been spreading via the systems of Mailchimp, a well-known email service provider - a tactic which may give the campaigns a slightly higher success rate.

Read more  

VB2017 video: The state of cybersecurity in Africa: Kenya

Posted by   Martijn Grooten on   Mar 1, 2018

Though many of the IT security issues we face are global, there is a noticeable difference in the threats faced in various countries and regions, as well as in the ways they are dealt with. At VB2017, we heard from Tyrus Kamau about the state of cybersecurity in Kenya. Today, we publish the video of Tyrus's talk.

Read more  

A crime against statistics that is probably worse than the cyber attacks faced in County Durham

Posted by   Martijn Grooten on   Feb 21, 2018

A report on the number of cyber attacks faced by UK local authorities is a good example of how the large numbers seen in many reports on security are rather meaningless.

Read more  

NCSC gives important advice on lateral movement

Posted by   Martijn Grooten on   Feb 20, 2018

The UK's National Cyber Security Centre (NCSC) has provided helpful and practical advice on preventing and detecting lateral movement by an attacker within a network.

Read more  

What kind of people attend Virus Bulletin conferences?

Posted by   Martijn Grooten on   Feb 17, 2018

If you are considering submitting a proposal for a talk to VB2018 and you're not familiar with the event, you may find it useful to know what kind of people attend the conference.

Read more  

Olympic Games target of malware, again

Posted by   Martijn Grooten on   Feb 15, 2018

An unattributed malware attack has disrupted some computer systems of the 2018 Winter Olympics. In 1994, a computer virus also targeted the Winter Olympics.

Read more  

There are lessons to be learned from government websites serving cryptocurrency miners

Posted by   Martijn Grooten on   Feb 12, 2018

Thousands of websites, including many sites of government organisations in the UK, the US and Sweden, were recently found to have been serving a cryptocurrency miner. More interesting than the incident itself, though, are the lessons that can be learned from it.

Read more  

We need to continue the debate on the ethics and perils of publishing security research

Posted by   Martijn Grooten on   Feb 9, 2018

An article by security researcher Collin Anderson reopens the debate on whether publishing threat analyses is always in the public interest.

Read more  

Search blog

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/01/january-issue-vb-published/

FTC notes malicious spam on the rise

FTC reports on a decade of spam fighting.
FTC reports on a decade of spam fighting. The US Federal Trade Commission (FTC) has released a report reflecting on the ten years in which it has been involved in the fight… https://www.virusbulletin.com/blog/2008/01/ftc-notes-malicious-spam-rise/

All in the name

Grisoft becomes AVG.
Grisoft becomes AVG. Last month, Czech firm Grisoft, developer of widely used anti-malware product AVG, changed its corporate name to AVG Technologies CZ, s.r.o. Having operated… https://www.virusbulletin.com/blog/2008/01/all-name/

No taste for spam?

ICANN takes steps to combat domain tasting.
ICANN takes steps to combat domain tasting. The practice of domain tasting, often used by spammers and other shady types to register tens of thousands of Internet domain names at… https://www.virusbulletin.com/blog/2008/01/no-taste-spam/

Prolific spammer indicted

Notorious spammer Alan Ralsky charged with spamming and stock fraud.
Notorious spammer Alan Ralsky charged with spamming and stock fraud. Infamous prolific spammer Alan Ralsky has been indicted over his alleged involvement in an international… https://www.virusbulletin.com/blog/2008/01/prolific-spammer-indicted/

2008

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsMS to release out-of-band patch for critical IE vulnerabilityUsers advised to patch ASAP. 17 December 2008IE zero-day danger growingLarge numbers of users vulnerable to… https://www.virusbulletin.com/blog/2008/

Magic lanterns shine at terrorists

Virus Bulletin finds 40% of users think governments should write viruses to bug terrorists.
Virus Bulletin finds 40% of users think governments should write viruses to bug terrorists.In a survey of visitors to the Virus Bulletin website, 40% of computer users said they… https://www.virusbulletin.com/blog/2007/12/magic-lanterns-shine-terrorists/

Zero-day exploit for Japanese word processor Ichitaro

Trend Micro notes increase in regionally targeted attacks as trojan becomes latest to exploit a Ichitaro flaw.
Trend Micro notes increase in regionally targeted attacks as trojan becomes latest to exploit a Ichitaro flaw. A trojan has been found to be exploiting a buffer overflow… https://www.virusbulletin.com/blog/2007/12/zero-day-exploit-japanese-word-processor-ichitaro/

$3.2 billion lost in phishing attacks in 2007

Gartner survey reveals US losses to phishing gangs.
Gartner survey reveals US losses to phishing gangs. Analyst firm Gartner has estimated that $3.2 billion was lost by 3.6 million US computer users in phishing attacks over the 12… https://www.virusbulletin.com/blog/2007/12/3-2-billion-lost-phishing-attacks-2007/

Survey finds 75% lose trust in data-loss firms

Security breaches seriously undermining public respect.
Security breaches seriously undermining public respect. A survey carried out jointly by security company Check Point and research firm YouGov has found public reaction to data… https://www.virusbulletin.com/blog/2007/12/survey-finds-75-lose-trust-data-loss-firms/

Latest VB100 announced

Windows Server 2003 products to be tested.
Windows Server 2003 products to be tested. VB has issued a call for submissions for the latest VB100 comparative review, which will measure the performance of products for the… https://www.virusbulletin.com/blog/2007/12/latest-announced/

VB100 update

Several issues resulting from recent Windows 2000 test cleared up.
Several issues resulting from recent Windows 2000 test cleared up. After a busy and drama-filled VB100 month, several issues arising from the test have been subject to further… https://www.virusbulletin.com/blog/2007/12/update/

Four IE bugs fixed by Patch Tuesday release

Seven updates, three critical in monthly security update.
Seven updates, three critical in monthly security update.Microsoft has released its monthly 'Patch Tuesday' security bulletin, featuring seven updates of which three are marked… https://www.virusbulletin.com/blog/2007/12/four-ie-bugs-fixed-patch-tuesday-release/

Cyber attackers breach defences at secret US labs

Spearphishing and trojans penetrate research lab security.
Spearphishing and trojans penetrate research lab security. At least one major US science lab, used to handle highly classified government and military material, has had its… https://www.virusbulletin.com/blog/2007/12/cyber-attackers-breach-defences-secret-us-labs/

UK spooks spooked by possible Chinese hacking

MI5 warns of suspected corporate espionage onslaught.
MI5 warns of suspected corporate espionage onslaught. The UK security service MI5 has issued an alert to 300 leading firms, warning them to ensure best possible security measures… https://www.virusbulletin.com/blog/2007/12/uk-spooks-spooked-possible-chinese-hacking/

Grisoft acquires Exploit Prevention Labs

AVG to incorporate LinkScanner in further consolidation of security offerings.
AVG to incorporate LinkScanner in further consolidation of security offerings.Grisoft, developer of the AVG security product whose free version is widely deployed on home-user… https://www.virusbulletin.com/blog/2007/12/grisoft-acquires-exploit-prevention-labs/

Vista fails to reassure web users

50% of users don't believe Vista has made the Internet any safer.
50% of users don't believe Vista has made the Internet any safer. According to a recent poll, 50% of visitors to the VB website do not believe that Windows Vista has made the… https://www.virusbulletin.com/blog/2007/12/vista-fails-reassure-web-users/

Yuletide greetings

Festive wishes.
Festive wishes. The members of the VB team extend their warm wishes to Virus Bulletin readers for a very happy holiday season and a healthy and prosperous new year. This Christmas… https://www.virusbulletin.com/blog/2007/12/yuletide-greetings/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/12/

Botnet roasting on an open fire

FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008.
FBI reports successes of operation Bot Roast; McAfee predicts cyber espionage for 2008. The FBI has revealed that eight individuals have been indicted, pled guilty or been… https://www.virusbulletin.com/blog/2007/12/botnet-roasting-open-fire/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.