VB Blog

Virus Bulletin at RSA

Posted by   Martijn Grooten on   Apr 13, 2018

Next week, VB Editor Martijn Grooten will be at the RSA Conference in San Francisco.

Read more  

Broad-ranging and international VB2018 programme announced

Posted by   Martijn Grooten on   Apr 11, 2018

VB is excited to reveal the details of an interesting and diverse programme for VB2018, the 28th Virus Bulletin International Conference, which takes place 3-5 October in Montreal, Canada.

Read more  

Netflix issue shows email verification really does matter

Posted by   Martijn Grooten on   Apr 10, 2018

A clever trick taking advantage of the fact that Gmail ignores dots in email addresses could be used to trick someone into paying for your Netflix subscription - demonstrating the importance of confirmed opt-in.

Read more  

VB2017 paper: Exploring the virtual worlds of advergaming

Posted by   Martijn Grooten on   Apr 10, 2018

At VB2017 in Madrid, Malwarebytes' Chris Boyd presented a paper in which he looked at various aspects of advergaming, from unreadable EULAs to fake programs that promise to block ads. Today, we publish both the paper and the recording of Chris's presentation.

Read more  

New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach

Posted by   Martijn Grooten on   Mar 27, 2018

Two or more mobile apps, viewed independently, may not appear to be malicious - but in combination, they could become harmful by exchanging information with one another and by performing malicious activities together. Today, we publish a new paper by a group of researchers affiliated with various UK universities and companies, which looks at how machine-learning methods can be used to detect app collusions.

Read more  

VB2016 paper: Wild Android collusions

Posted by   Martijn Grooten on   Mar 26, 2018

At VB2016 in Denver, Jorge Blasco presented a paper (co-written with Thomas M. Chen, Igor Muttik and Markus Roggenbach), in which he discussed the concept of app collusion - where two (or more) apps installed on the same device work together to collect and extract data from the device - and presented discoveries of colluding code in many in-the-wild apps. Today, we publish both the paper and the recording of Jorge's presentation.

Read more  

VB2017 paper: The life story of an IPT - Inept Persistent Threat actor

Posted by   Martijn Grooten on   Mar 19, 2018

At VB2017 in Madrid, Polish security researcher and journalist Adam Haertlé presented a paper about a very inept persistent threat. Today, we publish both the paper and the recording of Adam's presentation.

Read more  

Five reasons to submit a VB2018 paper this weekend

Posted by   Martijn Grooten on   Mar 16, 2018

The call for papers for VB2018 closes on 18 March, and while we've already received many great submissions, we still want more! Here are five reasons why you should submit a paper this weekend.

Read more  

First partners of VB2018 announced

Posted by   Martijn Grooten on   Mar 15, 2018

We are excited to announce the first six companies to partner with VB2018.

Read more  

VB2018: looking for technical and non-technical talks

Posted by   Martijn Grooten on   Mar 9, 2018

We like to pick good, solid technical talks for the VB conference programme, but good talks don't have to be technical and we welcome less technical submissions just as much.

Read more  

Search blog

Smartphone security sphere to reach $5 billion by 2011

Market analysts foresee boom in mobile threats and security market.
Market analysts foresee boom in mobile threats and security market. UK-based telecoms analyst Juniper Research has released a report predicting a steady rise in attacks on… https://www.virusbulletin.com/blog/2006/12/smartphone-security-sphere-reach-5-billion-2011/

MIME tricks beat email virus scanners

Simple encoding dodges slip malware past gateways.
Simple encoding dodges slip malware past gateways. A security researcher released a report last week claiming that some simple manipulation allowed him to get mails containing the… https://www.virusbulletin.com/blog/2006/12/mime-tricks-beat-email-virus-scanners/

Anti-spyware activists condemn rogue MP3 search firm

CDT and StopBadware unite in call for action against spyware pushers.
CDT and StopBadware unite in call for action against spyware pushers. The Center for Democracy and Technology (CDT) and StopBadware.org have issued a joint complaint to the Federal… https://www.virusbulletin.com/blog/2006/12/anti-spyware-activists-condemn-rogue-mp3-search-firm/

Adobe hit by second vulnerability

More document software security worries.
More document software security worries. PDF software giant Adobe has released details of its second vulnerability in little over a week. The first, which was discovered in the… https://www.virusbulletin.com/blog/2006/12/adobe-hit-second-vulnerability/

Free firewalls rated best in leak tests

Leakage review puts Comodo, Jetico way ahead of field.
Leakage review puts Comodo, Jetico way ahead of field. An in-depth study subjecting 23 different personal firewall products to a range of leak tests has granted two free products,… https://www.virusbulletin.com/blog/2006/12/free-firewalls-rated-best-leak-tests/

Mobile spam wave hits Europe

Multilingual SMS spams reported.
Multilingual SMS spams reported. Mobile security researchers at F-Secure have received numerous reports of SMS spams from across Europe, in a variety of languages. Links in the… https://www.virusbulletin.com/blog/2006/12/mobile-spam-wave-hits-europe/

Trojan spreading mobile spyware

Consumer phone-snooping tool dropped by Symbian malware.
Consumer phone-snooping tool dropped by Symbian malware. A new variant of the MultiDropper trojan targeting Symbian smartphones has included amongst its payload a 'legitimate'… https://www.virusbulletin.com/blog/2006/12/trojan-spreading-mobile-spyware/

MS Word zero-day exploit seen in wild

Microsoft warns of attacks using vulnerability.
Microsoft warns of attacks using vulnerability.Microsoft has issued a security bulletin warning of a serious vulnerability discovered in several versions of Microsoft Word and… https://www.virusbulletin.com/blog/2006/12/ms-word-zero-day-exploit-seen-wild/

Firm charged $1 million in rogue spyware case

Heavy fines and fees hit fake 'Spyware Cleaner' pushers.
Heavy fines and fees hit fake 'Spyware Cleaner' pushers. A Seattle court has announced a $1 million settlement in a case brought against a spyware firm, marking the first… https://www.virusbulletin.com/blog/2006/12/firm-charged-1-million-rogue-spyware-case/

EU to fund Symantec phishing studies

Security firm in consortium researching phishing prevention.
Security firm in consortium researching phishing prevention.Symantec announced yesterday an award of funding from the European Commission to pay for research into securing email… https://www.virusbulletin.com/blog/2006/12/eu-fund-symantec-phishing-studies/

MySpace hit by worm, adware and phishing

Exploit in QuickTime file infecting social site profile pages.
Exploit in QuickTime file infecting social site profile pages. A malicious QuickTime movie file is spreading across social networking site MySpace, embedding itself in the user… https://www.virusbulletin.com/blog/2006/12/myspace-hit-worm-adware-and-phishing/

Vista launched, malware still a danger

New Windows version on sale, but viruses remain a threat, says Sophos
New Windows version on sale, but viruses remain a threat, says Sophos The corporate version Microsoft's long-awaited update to its Windows operating system was finally released… https://www.virusbulletin.com/blog/2006/12/vista-launched-malware-still-danger/

China source of huge phishing surge

Spam watchers see major jump in scam spam sent from China
Spam watchers see major jump in scam spam sent from China Analysts at email and web security firm Marshal have reported a major spike in the numbers of phishing email originating… https://www.virusbulletin.com/blog/2006/12/china-source-huge-phishing-surge/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/12/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2006 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2006/12/december-issue-vb-published/

Festive greetings

Yuletide wishes.
Yuletide wishes. The VB team wishes all Virus Bulletin readers a very happy Christmas and a prosperous and peaceful new year. This year, continuing the tradition of its Christmas… https://www.virusbulletin.com/blog/2006/12/festive-greetings/

Anti-spammer loses case

Anti-spam activist sued in case that brings enforceability of state anti-spam laws into question.
Anti-spam activist sued in case that brings enforceability of state anti-spam laws into question. An anti-spam activist has successfully been sued in a US federal court by the… https://www.virusbulletin.com/blog/2006/12/anti-spammer-loses-case/

In the picture?

Remember VB94?
Remember VB94? Were you at VB94 in Jersey? VB has unearthed some photos taken at the fourth Virus Bulletin Conference. To see those who were the fresh faces of the anti-virus… https://www.virusbulletin.com/blog/2006/12/picture/

Stocking filler

Collection of 419 baiting tales.
Collection of 419 baiting tales. If you're stuck for a last-minute Christmas gift idea, Mike Berry's new book could be the answer. Mike Berry is the creator of 'scam-baiting'… https://www.virusbulletin.com/blog/2006/12/stocking-filler/

Europe facing 38 billion spams a day by 2010

Research group releases report on future spam trends.
Research group releases report on future spam trends. Technology market research firm The Radicati Group has unveiled an in-depth study of likely future trends in the European… https://www.virusbulletin.com/blog/2006/11/europe-facing-38-billion-spams-day-2010/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.