VB Blog

Five tips for submitting to Calls for Papers

Posted by   Martijn Grooten on   Aug 9, 2017

With the VB2017 Call for Papers out, here are five tips to increase your chances of getting your submission accepted.

Read more  

The WannaCry kill switch wasn't inserted to make someone a hero

Posted by   Martijn Grooten on   Aug 8, 2017

Following the arrest of WannaCry hero Marcus Hutchings, suggestions have been made that he was behind the WannaCry malware itself, and that he inserted the kill switch to make himself a hero. This seems highly unlikely.

Read more  

Throwback Thursday: Ten memorable Virus Bulletin conference presentations - part 1

Posted by   Martijn Grooten on   Aug 3, 2017

In a two-part blog post series, we look back at ten memorable VB conference presentations from the past ten years.

Read more  

Worms wiggling inside your networks are a lot harder to stop

Posted by   Martijn Grooten on   Aug 3, 2017

The authors of the Trickbot banking trojan seem to have taken note of the use of SMB by WannaCry and (Not)Petya and have added an (experimental) module that uses SMB for lateral movement.

Read more  

VB2017 drinks reception to be hosted in Madrid's unique Geographic Club

Posted by   Martijn Grooten on   Aug 1, 2017

To give those attending VB2017 Madrid a chance to experience a little bit of the host city, the VB2017 drinks reception will be held at the unique and fascinating Geographic Club.

Read more  

By removing VPNs from its Chinese App Store, Apple turns its biggest security asset against its users

Posted by   Martijn Grooten on   Aug 1, 2017

To comply with Chinese laws, Apple has removed all iOS VPN apps from its Chinese app store. This means that the company uses iOS's strongest security asset, its tightly controlled App Store, against its own users.

Read more  

VB2017 Small Talks and reserve papers announced

Posted by   Martijn Grooten on   Jul 28, 2017

Today we announce the first two Small Talks for the VB2017 programme: ENISA will provide its perspective on the WannaCry outbreak and the lessons learned from it, while David Harley will talk about the past and present of security product testing.

Read more  

NoMoreRansom's first birthday demonstrates importance of collaboration

Posted by   Martijn Grooten on   Jul 27, 2017

This week the NoMoreRansom project celebrated its first birthday. It has already helped many victims of ransomware with advice and tools and is an excellent example of collaboration between private and public partners in IT security.

Read more  

VB2017 call for last-minute papers opened

Posted by   Martijn Grooten on   Jul 26, 2017

Today, we open the call for last-minute papers for VB2017. Submit before 3 September to have your abstract considered for one of the ten slots reserved for 'hot' research.

Read more  

Five reasons to come to VB2017 in Madrid

Posted by   Martijn Grooten on   Jul 25, 2017

We're not ones to make bold claims about our conference, and we suggest you ask past attendees for their opinion, but here are five reasons why we think you should come to VB2017 in Madrid.

Read more  

Search blog

'Direct' cost of malware infections on the decline

Report finds direct costs from malware infections declined over last two years.
Report finds direct costs from malware infections declined over last two years. A report by Computer Economics has stated that the financial impact of malware infections fell to… https://www.virusbulletin.com/blog/2007/06/direct-cost-malware-infections-decline/

Spammer enters guilty plea

Admits to having spammed 1.2 million AOL customers.
Admits to having spammed 1.2 million AOL customers. A Brooklyn man has pleaded guilty to having sent spam messages to over 1.2 million AOL customers in August 2005. According to… https://www.virusbulletin.com/blog/2007/06/spammer-enters-guilty-plea/

Serious holes in Yahoo! Messenger

Critical vulnerabilities fully disclosed.
Critical vulnerabilities fully disclosed. Two security flaws in the popular Yahoo! Messenger communications software have been reported, with full details available online before a… https://www.virusbulletin.com/blog/2007/06/serious-holes-yahoo-messenger/

Spam barrages take down filters, networks

Report shows increase in spam bombardment attacks.
Report shows increase in spam bombardment attacks.MessageLabs' monthly report on the latest trends in spam has warned of an alarming rise in 'spam spikes', targeted attacks which… https://www.virusbulletin.com/blog/2007/06/spam-barrages-take-down-filters-networks/

Amero case sent for retrial

Spyware popup teacher told earlier trial was flawed.
Spyware popup teacher told earlier trial was flawed. Connecticut temporary teaching assistant Julie Amero, convicted of exposing minors to danger when a classroom computer she had… https://www.virusbulletin.com/blog/2007/06/amero-case-sent-retrial/

Microsoft details 'Stirling' integrated suite

Comprehensive security product promised in next-gen Forefront.
Comprehensive security product promised in next-gen Forefront.Microsoft, whose Forefront corporate anti-malware system is the latest step in a continuing onslaught on the security… https://www.virusbulletin.com/blog/2007/06/microsoft-details-stirling-integrated-suite/

Online malware dangers analysed

Google, McAfee release webserver, search result figures.
Google, McAfee release webserver, search result figures. Two reports out this week have revealed some interesting statistics on the security dangers involved in browsing the… https://www.virusbulletin.com/blog/2007/06/online-malware-dangers-analysed/

CA struck by vulnerability

CAB handling issue affects swathe of products.
CAB handling issue affects swathe of products. Two flaws related to the handling of CAB archive files by the CA anti-virus engine have been reported, rendering products across CA's… https://www.virusbulletin.com/blog/2007/06/ca-struck-vulnerability/

Pestilent spammer arrested

Another 'spam king' locked up.
Another 'spam king' locked up. A man described by anti-spam organisation Spamhaus as 'one of the most persistent professional spammers' was arrested in Seattle late last month… https://www.virusbulletin.com/blog/2007/06/pestilent-spammer-arrested/

Anti-spam laws take hold in Hong Kong

Tough new controls aim at stamping out spam.
Tough new controls aim at stamping out spam. Hong Kong has become the latest place to see the introduction of anti-spam laws, with the first phase of a two-stage process coming… https://www.virusbulletin.com/blog/2007/06/anti-spam-laws-take-hold-hong-kong/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2007 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2007/06/june-issue-vb-published/

Vulnerabilities galore

May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors.
May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors. May was a month of flaw revelations, with… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-galore/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/06/

Vulnerabilities strike more AV firms, and Mac too

F-Secure and Authentium patch holes, while Samba flaws worry Apple users.
F-Secure and Authentium patch holes, while Samba flaws worry Apple users. Users of Mac OS X, used to a cosy sense of security, have been warned of possible penetration vectors… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-strike-more-av-firms-and-mac-too/

Symantec sued for false positive

Chinese FP issue leads to court case.
Chinese FP issue leads to court case. A Chinese lawyer has begun court proceedings against security firm Symantec, claiming damages as a result of the widely-publicised false… https://www.virusbulletin.com/blog/2007/06/symantec-sued-false-positive/

Another 'Spam King' arrested

Spammer brought to book after 4-year campaign.
Spammer brought to book after 4-year campaign. A Seattle man was indicted yesterday on numerous charges of fraud and deception in relation to a campaign of spamming dating back to… https://www.virusbulletin.com/blog/2007/06/another-spam-king-arrested/

Google buys into security

Google makes stealth purchase of security firm.
Google makes stealth purchase of security firm. Search and entertainment giant Google completed the purchase of Internet security firm GreenBorder Technologies in mid-May - but… https://www.virusbulletin.com/blog/2007/05/google-buys-security/

Google stashing adware on Dell systems, says OpenDNS founder

Toolbar partnership accused of devious spyware tactics.
Toolbar partnership accused of devious spyware tactics. The partnership between search giant Google and hardware behemoth Dell, which has led to the popular Google Toolbar being… https://www.virusbulletin.com/blog/2007/05/google-stashing-adware-dell-systems-says-opendns-founder/

Overflows hit NOD32

Vulnerabilities disclosed after patching.
Vulnerabilities disclosed after patching. Two stack-overflow vulnerabilities have been disclosed in Eset's flagship NOD32 AntiVirus product, which could have been exploited to… https://www.virusbulletin.com/blog/2007/05/overflows-hit-nod32/

IETF accepts DKIM specification as proposed standard

Email authentication system moves to approval stage.
Email authentication system moves to approval stage. The Internet Engineering Task Force (IETF), the body overseeing the technical running of the Internet, has accepted a new… https://www.virusbulletin.com/blog/2007/05/ietf-accepts-dkim-specification-proposed-standard/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.