VB Blog

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to Android security, the Tor Project, and exploit kits.

Read more  

Research shows web security products perform well against exploit kits

Posted by   Martijn Grooten on   Aug 24, 2016

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Read more  

Search blog

Spammer enters guilty plea

Admits to having spammed 1.2 million AOL customers.
Admits to having spammed 1.2 million AOL customers. A Brooklyn man has pleaded guilty to having sent spam messages to over 1.2 million AOL customers in August 2005. According to… https://www.virusbulletin.com/blog/2007/06/spammer-enters-guilty-plea/

'Direct' cost of malware infections on the decline

Report finds direct costs from malware infections declined over last two years.
Report finds direct costs from malware infections declined over last two years. A report by Computer Economics has stated that the financial impact of malware infections fell to… https://www.virusbulletin.com/blog/2007/06/direct-cost-malware-infections-decline/

Serious holes in Yahoo! Messenger

Critical vulnerabilities fully disclosed.
Critical vulnerabilities fully disclosed. Two security flaws in the popular Yahoo! Messenger communications software have been reported, with full details available online before a… https://www.virusbulletin.com/blog/2007/06/serious-holes-yahoo-messenger/

Amero case sent for retrial

Spyware popup teacher told earlier trial was flawed.
Spyware popup teacher told earlier trial was flawed. Connecticut temporary teaching assistant Julie Amero, convicted of exposing minors to danger when a classroom computer she had… https://www.virusbulletin.com/blog/2007/06/amero-case-sent-retrial/

Microsoft details 'Stirling' integrated suite

Comprehensive security product promised in next-gen Forefront.
Comprehensive security product promised in next-gen Forefront.Microsoft, whose Forefront corporate anti-malware system is the latest step in a continuing onslaught on the security… https://www.virusbulletin.com/blog/2007/06/microsoft-details-stirling-integrated-suite/

Spam barrages take down filters, networks

Report shows increase in spam bombardment attacks.
Report shows increase in spam bombardment attacks.MessageLabs' monthly report on the latest trends in spam has warned of an alarming rise in 'spam spikes', targeted attacks which… https://www.virusbulletin.com/blog/2007/06/spam-barrages-take-down-filters-networks/

CA struck by vulnerability

CAB handling issue affects swathe of products.
CAB handling issue affects swathe of products. Two flaws related to the handling of CAB archive files by the CA anti-virus engine have been reported, rendering products across CA's… https://www.virusbulletin.com/blog/2007/06/ca-struck-vulnerability/

Online malware dangers analysed

Google, McAfee release webserver, search result figures.
Google, McAfee release webserver, search result figures. Two reports out this week have revealed some interesting statistics on the security dangers involved in browsing the… https://www.virusbulletin.com/blog/2007/06/online-malware-dangers-analysed/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2007 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2007/06/june-issue-vb-published/

Vulnerabilities galore

May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors.
May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors. May was a month of flaw revelations, with… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-galore/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/06/

Vulnerabilities strike more AV firms, and Mac too

F-Secure and Authentium patch holes, while Samba flaws worry Apple users.
F-Secure and Authentium patch holes, while Samba flaws worry Apple users. Users of Mac OS X, used to a cosy sense of security, have been warned of possible penetration vectors… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-strike-more-av-firms-and-mac-too/

Symantec sued for false positive

Chinese FP issue leads to court case.
Chinese FP issue leads to court case. A Chinese lawyer has begun court proceedings against security firm Symantec, claiming damages as a result of the widely-publicised false… https://www.virusbulletin.com/blog/2007/06/symantec-sued-false-positive/

Another 'Spam King' arrested

Spammer brought to book after 4-year campaign.
Spammer brought to book after 4-year campaign. A Seattle man was indicted yesterday on numerous charges of fraud and deception in relation to a campaign of spamming dating back to… https://www.virusbulletin.com/blog/2007/06/another-spam-king-arrested/

Pestilent spammer arrested

Another 'spam king' locked up.
Another 'spam king' locked up. A man described by anti-spam organisation Spamhaus as 'one of the most persistent professional spammers' was arrested in Seattle late last month… https://www.virusbulletin.com/blog/2007/06/pestilent-spammer-arrested/

Anti-spam laws take hold in Hong Kong

Tough new controls aim at stamping out spam.
Tough new controls aim at stamping out spam. Hong Kong has become the latest place to see the introduction of anti-spam laws, with the first phase of a two-stage process coming… https://www.virusbulletin.com/blog/2007/06/anti-spam-laws-take-hold-hong-kong/

Google buys into security

Google makes stealth purchase of security firm.
Google makes stealth purchase of security firm. Search and entertainment giant Google completed the purchase of Internet security firm GreenBorder Technologies in mid-May - but… https://www.virusbulletin.com/blog/2007/05/google-buys-security/

Google stashing adware on Dell systems, says OpenDNS founder

Toolbar partnership accused of devious spyware tactics.
Toolbar partnership accused of devious spyware tactics. The partnership between search giant Google and hardware behemoth Dell, which has led to the popular Google Toolbar being… https://www.virusbulletin.com/blog/2007/05/google-stashing-adware-dell-systems-says-opendns-founder/

Overflows hit NOD32

Vulnerabilities disclosed after patching.
Vulnerabilities disclosed after patching. Two stack-overflow vulnerabilities have been disclosed in Eset's flagship NOD32 AntiVirus product, which could have been exploited to… https://www.virusbulletin.com/blog/2007/05/overflows-hit-nod32/

IETF accepts DKIM specification as proposed standard

Email authentication system moves to approval stage.
Email authentication system moves to approval stage. The Internet Engineering Task Force (IETF), the body overseeing the technical running of the Internet, has accepted a new… https://www.virusbulletin.com/blog/2007/05/ietf-accepts-dkim-specification-proposed-standard/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.