VB Blog

VB2018 paper: Fake News, Inc.

Posted by   Helen Martin on   Apr 25, 2019

A former reporter by profession, Andrew Brandt's curiosity was piqued when he came across what appeared at first glance to be the website of a small-town newspaper based in Illinois, but under scrutiny, things didn’t add up. At VB2018 he presented a paper in which he shared the results of his investigation of the site. Today, we publish his paper and the recording of his presentation.

Read more  

Paper: Alternative communication channel over NTP

Posted by   Martijn Grooten on   Apr 24, 2019

In a new paper published today, independent researcher Nikolaos Tsapakis writes about the possibilities of malware using NTP as a covert communication channel and how to stop this.

Read more  

VB2019 conference programme announced

Posted by   Martijn Grooten on   Apr 5, 2019

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.

Read more  

VB2018 paper: Under the hood - the automotive challenge

Posted by   Martijn Grooten on   Mar 27, 2019

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the challenges ahead. Today, we publish both Inbar's paper and the recording of his presentation.

Read more  

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Posted by   Martijn Grooten on   Mar 20, 2019

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that combines static and dynamic analysis to defeat app obfuscation in Android binaries. We also publish the video of their presentation.

Read more  

VB2019 call for papers closes this weekend

Posted by   Martijn Grooten on   Mar 15, 2019

The call for papers for VB2019 closes on 17 March, and while we've already received many great submissions, we still want more!

Read more  

Registration open for VB2019 ─ book your ticket now!

Posted by   Martijn Grooten on   Mar 13, 2019

Registration for VB2019, the 29th Virus Bulletin International Conference, is now open, with an early bird rate available until 1 July.

Read more  

The VB2019 call for papers is about ... papers

Posted by   Martijn Grooten on   Mar 8, 2019

When we are calling for papers for the Virus Bulletin conference as we are doing now, we really mean a written paper. But don't worry if you've never written a paper - we can help!

Read more  

VB2018 video: Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived

Posted by   Martijn Grooten on   Mar 8, 2019

Amit Serper first analysed the OSX/Pirrit adware in 2016, highlighting some of its malware-like techniques, and soon afterwards started receiving legal threats from the company behind it. At VB2018 Amit gave a presentation in which he discussed both the adware and the legal threats he received for calling it malware. Today, we publish the video of Amit's presentation.

Read more  

VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Mar 5, 2019

In December 2016, the CRASHOVERRIDE malware framework was used to cause a blackout in Ukraine. At VB2018 in Montreal, Dragos researcher Joe Slowik presented a detailed paper on the framework, explaining how the malware works and how it targets various protocols used to operate the electric grid. Today we publish both Joe's paper and the recording of his presentation.

Read more  

Search blog

Storm botnet evolution hints at spam and DDoS renting

Latest change in tactics could mean zombie clusters for hire.
Latest change in tactics could mean zombie clusters for hire. The latest twist in the long-running 'Storm' saga, the use of encryption in communications between infected hosts and… https://www.virusbulletin.com/blog/2007/10/storm-botnet-evolution-hints-spam-and-ddos-renting/

Bulletproof hosting firm claims legitimacy

Crime-laden Russian service threatens to sue detractors.
Crime-laden Russian service threatens to sue detractors. A notorious Russian firm offering 'bulletproof hosting' - website hosting services with a guarantee that sites will not be… https://www.virusbulletin.com/blog/2007/10/bulletproof-hosting-firm-claims-legitimacy/

Online fraud fighters' reputation targeted by crooks

Joe Job attack aims to blacken good name of UK crimefighter Bobbear.
Joe Job attack aims to blacken good name of UK crimefighter Bobbear. In a smear attack against UK-based online fraud-fighting website Bobbear.co.uk, spammers have sent out email… https://www.virusbulletin.com/blog/2007/10/online-fraud-fighters-reputation-targeted-crooks/

Kaspersky fixes serious vulnerability in Online Scanner

Exploitable ActiveX control replaced in new version.
Exploitable ActiveX control replaced in new version.Kaspersky Lab has released an updated version of its popular free online scanner to remedy a vulnerability in an ActiveX control… https://www.virusbulletin.com/blog/2007/10/kaspersky-fixes-serious-vulnerability-online-scanner/

Five to six years for $1 million porn spammers

Strong sentences for CAN-SPAM breaches, money laundering.
Strong sentences for CAN-SPAM breaches, money laundering. Two US men found guilty in June of breaching the terms of the 2003 CAN-SPAM Act, as well as numerous other charges… https://www.virusbulletin.com/blog/2007/10/five-six-years-1-million-porn-spammers/

Word for Mac exploit spotted

Patch Tuesday flaw targeted by vulnerability.
Patch Tuesday flaw targeted by vulnerability. A vulnerability in the Apple Mac version of Microsoft Word, covered by a patch in this month's Patch Tuesday security update, has been… https://www.virusbulletin.com/blog/2007/10/word-mac-exploit-spotted/

Storm attack strikes back

Cute kitten cards cover latest wave of malware.
Cute kitten cards cover latest wave of malware. The Storm attack has returned with yet another wave of blended attacks, with links to the drive-by download sites of the initial… https://www.virusbulletin.com/blog/2007/10/storm-attack-strikes-back/

4 out of 5 critical issues fixed on Patch Tuesday

Expected patch omitted from monthly security update.
Expected patch omitted from monthly security update.Microsoft has announced the contents of its monthly 'Patch Tuesday' security update release, with four 'Critical' and two… https://www.virusbulletin.com/blog/2007/10/4-out-5-critical-issues-fixed-patch-tuesday/

Adobe acknowledges PDF flaw, issues workaround

Registry hack provides temporary fix for vulnerability.
Registry hack provides temporary fix for vulnerability.Adobe has officially confirmed the vulnerability announced last month by researcher Petko Petkov, which could allow… https://www.virusbulletin.com/blog/2007/10/adobe-acknowledges-pdf-flaw-issues-workaround/

Spam sneaked out via YouTube systems

Entertainment site service used to send junk mails.
Entertainment site service used to send junk mails. Spammers have taken advantage of an email service provided by popular video clip site YouTube, to send out spams pushing dating… https://www.virusbulletin.com/blog/2007/10/spam-sneaked-out-youtube-systems/

McAfee invests in encryption firm

SafeBoot acquired for $350 million.
SafeBoot acquired for $350 million.McAfee has announced the acquisition of encryption and device control specialist SafeBoot, which produces a range of security products for PCs… https://www.virusbulletin.com/blog/2007/10/mcafee-invests-encryption-firm/

US users overestimating PC security

Survey finds people are less protected than they think.
Survey finds people are less protected than they think. A joint study carried out by McAfee and the National Cyber Security Alliance (NCSA) has found that many US consumers wrongly… https://www.virusbulletin.com/blog/2007/10/us-users-overestimating-pc-security/

Smaller vendors question rumours of impending doom

Experts deny claims that flood of threats gives bigger firms advantage.
Experts deny claims that flood of threats gives bigger firms advantage. High levels of new malware, emerging at an ever-increasing rate, may mean smaller security firms will no… https://www.virusbulletin.com/blog/2007/10/smaller-vendors-question-rumours-impending-doom/

Sun patches serious Java flaws

Critical vulnerabilities covered by urgent patches.
Critical vulnerabilities covered by urgent patches.Sun Microsystems has issued a series of patches to fix several vulnerabilities in its popular Java software. Successful… https://www.virusbulletin.com/blog/2007/10/sun-patches-serious-java-flaws/

Wot, no comparative?

VB100 Netware comparative review delayed.
VB100 Netware comparative review delayed.VB apologises to those expecting to find a VB100 comparative review of products on Novell Netware in this month's issue. Due to illness,… https://www.virusbulletin.com/blog/2007/10/wot-no-comparative/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/10/

Trivia

Panda reveals country with lowest level of infected PCs.
Panda reveals country with lowest level of infected PCs.Panda Security has revealed that results from its online malware-scanning tool Nanoscan indicate that computers it scanned… https://www.virusbulletin.com/blog/2007/10/trivia/

Alarm over possible PDF flaw

Vulnerability announcement hyped to disaster level.
Vulnerability announcement hyped to disaster level. The announcement of a potentially serious vulnerability in the ubiquitous Adobe PDF document format sparked considerable media… https://www.virusbulletin.com/blog/2007/10/alarm-over-possible-pdf-flaw/

October issue of VB published

The October issue of Virus Bulletin is now available for subscribers to download.
The October issue of Virus Bulletin is now available for subscribers to download. The October 2007 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2007/10/october-issue-vb-published/

Phil makes anti-phishing education child's play

Researchers create game to raise awareness.
Researchers create game to raise awareness. Researchers at Carnegie Mellon University have created an interactive game designed to teach players how to identify phishing URLs and… https://www.virusbulletin.com/blog/2007/10/phil-makes-anti-phishing-education-child-s-play/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.