VB Blog

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to Android security, the Tor Project, and exploit kits.

Read more  

Research shows web security products perform well against exploit kits

Posted by   Martijn Grooten on   Aug 24, 2016

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Read more  

Search blog

Worm targets old Symantec hole

Long-patched vulnerability attacked by new Spybot.
Long-patched vulnerability attacked by new Spybot. A version of the Spybot worm has been spotted attempting to use a vulnerability in Symantec Client Security and Symantec… https://www.virusbulletin.com/blog/2006/11/worm-targets-old-symantec-hole/

Europe facing 38 billion spams a day by 2010

Research group releases report on future spam trends.
Research group releases report on future spam trends. Technology market research firm The Radicati Group has unveiled an in-depth study of likely future trends in the European… https://www.virusbulletin.com/blog/2006/11/europe-facing-38-billion-spams-day-2010/

EU demands better spam and malware fighting

Commission report calls for smarter response to online onslaught.
Commission report calls for smarter response to online onslaught. An official statement from the European Commission has demanded a step up in the battle against spam, spyware and… https://www.virusbulletin.com/blog/2006/11/eu-demands-better-spam-and-malware-fighting/

Severe vulnerability hits Mac OSX

Exploit published for gaping DMG hole.
Exploit published for gaping DMG hole. A serious vulnerability found in the DMG handling on fully up-to-date installations of Apple's OSX is threatening to upset the platform's… https://www.virusbulletin.com/blog/2006/11/severe-vulnerability-hits-mac-osx/

Spyware pushers let off fines

FTC reduces punishment for crooks 'unable to pay'.
FTC reduces punishment for crooks 'unable to pay'. Two spyware operations have settled lawsuits brought against them by the Federal Trade Commission (FTC) at a huge discount. The… https://www.virusbulletin.com/blog/2006/11/spyware-pushers-let-fines/

Spammers and phishers target Christmas shoppers

Online shoppers and email users face heightened festive risks.
Online shoppers and email users face heightened festive risks. With the annual Christmas spending frenzy fast approaching, phishing is as usual on the rise, targeting inexperienced… https://www.virusbulletin.com/blog/2006/11/spammers-and-phishers-target-christmas-shoppers/

McAfee in anti-phishing confusion

Latest study rates all filters poorly, slates SiteAdvisor.
Latest study rates all filters poorly, slates SiteAdvisor. In two recent studies of anti-phishing technologies, one (sponsored by Microsoft) rated Internet Explorer highest, while… https://www.virusbulletin.com/blog/2006/11/mcafee-anti-phishing-confusion/

Zango still in spyware game

Dodgy tactics continue despite ruling.
Dodgy tactics continue despite ruling. Several researchers have complained that adware-fuelled media company Zango continues to use deceptive practices, despite the recent case… https://www.virusbulletin.com/blog/2006/11/zango-still-spyware-game/

ISS to integrate BitDefender

Big Blue adds anti-virus and anti-spyware to desktop security product.
Big Blue adds anti-virus and anti-spyware to desktop security product.IBM announced yesterday that its Internet Security Systems (ISS) subsidiary will be including anti-virus and… https://www.virusbulletin.com/blog/2006/11/iss-integrate-bitdefender/

UK toughens law against DoS, tools

New law ups penalties for hacking, but could threaten security research.
New law ups penalties for hacking, but could threaten security research. The UK 'Police and Justice Bill 2006', introduced into UK law this month, has drawn some approval for its… https://www.virusbulletin.com/blog/2006/11/uk-toughens-law-against-dos-tools/

Trojan planted on Chinese banking site

Backdoor dropper sneaked onto bank card operator's servers.
Backdoor dropper sneaked onto bank card operator's servers. News sources in China are reporting that the website of China UnionPay, a China-wide cross-bank credit card service used… https://www.virusbulletin.com/blog/2006/11/trojan-planted-chinese-banking-site/

Patch Tuesday vulnerability exploited

Attack developed within two days of disclosure.
Attack developed within two days of disclosure. The Workstation Service flaw announced and patched on Tuesday, one of the most critical vulnerabilities covered by Microsoft's… https://www.virusbulletin.com/blog/2006/11/patch-tuesday-vulnerability-exploited/

Worm targets Real Media files

McAfee warns of dangerous movies and music.
McAfee warns of dangerous movies and music. Researchers at McAfee's Avert Labs have warned of a new worm, dubbed 'W32/Realor', which doctors the contents of Real Media files… https://www.virusbulletin.com/blog/2006/11/worm-targets-real-media-files/

Firefox anti-phishing better, says Mozilla

Browser phishing filters battle for supremacy.
Browser phishing filters battle for supremacy.Mozilla has released results of an independently run test of phishing filters, in which its latest product, Firefox 2.0, is compared… https://www.virusbulletin.com/blog/2006/11/firefox-anti-phishing-better-says-mozilla/

Panda vulnerabilities revealed

ActiveScan remote access holes patched, details disclosed.
ActiveScan remote access holes patched, details disclosed. Several vulnerabilites have been found in Panda Software's ActiveScan product. The problems could be used to initiate a… https://www.virusbulletin.com/blog/2006/11/panda-vulnerabilities-revealed/

AVG, F-PROT suffer vulnerabilities

Reports of buffer overflows and other problems.
Reports of buffer overflows and other problems. A series of vulnerabilities have been discovered and patched in Grisoft's AVG Antivirus. Several issues with archive handling could… https://www.virusbulletin.com/blog/2006/11/avg-f-prot-suffer-vulnerabilities/

Mobile firewalls released

Trend, F-Secure add extra layer to smartphone security.
Trend, F-Secure add extra layer to smartphone security. Two new products have been unveiled this week offering firewall protection for smartphones and PDAs, with both Trend Micro… https://www.virusbulletin.com/blog/2006/11/mobile-firewalls-released/

Courts shut down spyware pushers

Media Motor operation frozen by FTC case.
Media Motor operation frozen by FTC case. The US Federal Trade Commission (FTC) has brought a case against the spyware operation Media Motor, with the company and its affiliates… https://www.virusbulletin.com/blog/2006/11/courts-shut-down-spyware-pushers/

Russians dominate spammer top ten

Half of ten worst spammers from former USSR.
Half of ten worst spammers from former USSR. This week's list of the top ten 'worst spammers and spam gangs', released by spam fighters Spamhaus, is dominated by eastern Europeans,… https://www.virusbulletin.com/blog/2006/11/russians-dominate-spammer-top-ten/

Forefront Client reaches beta

Microsoft corporate security product goes into public test.
Microsoft corporate security product goes into public test.Microsoft's long-awaited corporate security suite, Forefront Client Security, has been released to public beta. The new… https://www.virusbulletin.com/blog/2006/11/forefront-client-reaches-beta/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.