VB Blog

VB2018 paper: Little Brother is watching – we know all your secrets!

Posted by   Martijn Grooten on   Feb 1, 2019

At VB2018 in Montreal, researchers from Fraunhofer SIT looked at privacy vulnerabilities in legitimate Android family-tracking apps that leaked location data. Today, we publish both their paper and the video of their presentation.

Read more  

Threat intelligence teams should consider recruiting journalists

Posted by   Martijn Grooten on   Jan 29, 2019

Threat intelligence teams would do well to recruit journalists, whose experience is crucial in today's threat landscape.

Read more  

From HSBC to product descriptions: the malicious emails bypassing your filters

Posted by   Martijn Grooten on   Jan 28, 2019

Using data from our VBSpam lab, we looked at the malicious emails that have been missed recently by a large number of email security products.

Read more  

VB2018 paper: Inside Formbook infostealer

Posted by   Martijn Grooten on   Jan 25, 2019

The Formbook information-stealing trojan may not be APT-grade malware, but its continuing spread means it can still be effective. At VB2018 in Montreal, Gabriela Nicolao, a researcher from Deloitte in Argentina, presented a short paper in which she looked at Formbook's background and history and analysed a sample of the malware. Today, we publish Gabriela's paper.

Read more  

The VB2019 CFP - how the selection procedure works

Posted by   Martijn Grooten on   Jan 24, 2019

With the VB2019 Call for Papers having opened last week, we explain how the selection procedure works, which may help you during your abstract submission.

Read more  

VB2018 paper: From Hacking Team to hacked team to…?

Posted by   Martijn Grooten on   Jan 18, 2019

Today we publish the VB2018 paper and video by ESET researcher Filip Kafka, who looked at the new malware by Hacking Team, after the company had recovered from the 2015 breach.

Read more  

The spam that is hardest to block is often the most damaging

Posted by   Martijn Grooten on   Jan 17, 2019

We see a lot of spam in the VBSpam test lab, and we also see how well such emails are being blocked by email security products. Worryingly, it is often the emails with a malicious attachment or a phishing link that are most likely to be missed.

Read more  

Throwback Thursday: We're all doomed

Posted by   Helen Martin on   Jan 17, 2019

Mydoom turns 15 this month, and is still being seen in email attachments. This Throwback Thursday we look back to March 2004, when Gabor Szappanos tracked the rise of W32/Mydoom.

Read more  

VB2019 call for papers - now open!

Posted by   Martijn Grooten on   Jan 15, 2019

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2019 is now open and we want to hear from you!

Read more  

VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library

Posted by   Martijn Grooten on   Jan 14, 2019

Today, we publish a VB2018 paper by Google researcher Maddie Stone in which she looks at one of the most interesting anti-analysis native libraries in the Android ecosystem. We also release the recording of Maddie's presentation.

Read more  

Search blog

'Magic Quadrant' study unveiled

AV industry future revealed - must do better.
AV industry future revealed - must do better. Industry analyst and predictor Gartner has released its annual 'Magic Quadrant' study of the current state and likely future of the AV… https://www.virusbulletin.com/blog/2006/09/magic-quadrant-study-unveiled/

Word zero-day exploited

Trojan uses unpatched hole in office software.
Trojan uses unpatched hole in office software. At least one trojan has been seen in the wild exploiting a newly discovered vulnerability in Microsoft's Word 2000 software. The… https://www.virusbulletin.com/blog/2006/09/word-zero-day-exploited/

Subliminal message hidden in spam

Mail campaign aims to sneak into readers' subconscious minds.
Mail campaign aims to sneak into readers' subconscious minds. A spam campaign is using the classic 'submliminal message' technique in an attempt to implant thoughts in the minds of… https://www.virusbulletin.com/blog/2006/09/subliminal-message-hidden-spam/

Nine years for spam felon

Tough sentence upheld despite free-speech claims.
Tough sentence upheld despite free-speech claims. A US man convicted two years ago under the state of Virginia's anti-spam laws has lost an appeal against his conviction. The case,… https://www.virusbulletin.com/blog/2006/09/nine-years-spam-felon/

Gromozon mystery clearing

Cleaner tool aims to remove sophisticated attack.
Cleaner tool aims to remove sophisticated attack. The shadowy blended threat known as Gromozon has slowly been gaining notoriety in recent weeks, particularly after some in-depth… https://www.virusbulletin.com/blog/2006/09/gromozon-mystery-clearing/

Phishing on the rise

One in three malicious emails a phish, says MessageLabs.
One in three malicious emails a phish, says MessageLabs. A report on the current state of digital security has revealed that phishing scams constitute a growing danger to computer… https://www.virusbulletin.com/blog/2006/09/phishing-rise/

CA in Windows FP

eTrust identifies critical file as virus.
eTrust identifies critical file as virus. A mistake at CA caused some trouble over the weekend, as its eTrust products started identifying part of the Windows local authentication… https://www.virusbulletin.com/blog/2006/09/ca-windows-fp/

Mobile snoopware labelled spyware

Future phone privacy threatened.
Future phone privacy threatened. Reports this week highlighted the problem of spyware running on mobile phones, and the consequences this could have for privacy. A commercial… https://www.virusbulletin.com/blog/2006/09/mobile-snoopware-labelled-spyware/

New New Zealand spam laws to allow spam

Adjustments to laws may let 'non-commercial' spam continue.
Adjustments to laws may let 'non-commercial' spam continue. Recommendations have been made to dilute tough new anti-spam laws currently being debated by the New Zealand government.… https://www.virusbulletin.com/blog/2006/09/new-new-zealand-spam-laws-allow-spam/

Testing patience

Consumer Reports does it again.
Consumer Reports does it again. After having come in for a great deal of criticism in recent weeks over its AV testing methodology (see VB, September 2006, p.2), Consumer Reports… https://www.virusbulletin.com/blog/2006/09/testing-patience/

Worm spreads via mobiles. Maybe.

PC malware thought capable of using phones as vector.
PC malware thought capable of using phones as vector.F-Secure has reported a new worm which attempts to spread via mobile phones. The 'Mobler' worm, once activated, copies itself… https://www.virusbulletin.com/blog/2006/09/worm-spreads-mobiles-maybe/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2006/09/

Future browsers battle phishing

Microsoft and Mozilla's upcoming new versions to include safety measures.
Microsoft and Mozilla's upcoming new versions to include safety measures. Pre-release versions of both Mozilla FireFox 2 and Microsoft Internet Explorer 7 have been unveiled,… https://www.virusbulletin.com/blog/2006/09/future-browsers-battle-phishing/

More MS06-040 worries

Vulnerability still causing problems.
Vulnerability still causing problems. There have been further reports of malware spreading using the MS06-040 vulnerability, announced and patched three weeks ago on Microsoft's… https://www.virusbulletin.com/blog/2006/09/more-ms06-040-worries/

AT&T hack led to spearphish

Stolen details used to trick victims out of further info.
Stolen details used to trick victims out of further info. Transaction details stolen as part of last weekend's security breach of a shopping site run by US phone giant AT&T were… https://www.virusbulletin.com/blog/2006/09/amp-t-hack-led-spearphish/

A fine, a curfew and a treasure hunt

Round up of the month's spammer penalties.
Round up of the month's spammer penalties. Kicking off a round-up of some of the anti-spam penalties issued worldwide this month, the Chinese government has made an underwhelming… https://www.virusbulletin.com/blog/2006/09/fine-curfew-and-treasure-hunt/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2006 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2006/09/september-issue-vb-published/

Spot that spammer

Quiz tests consumers' ability to identify spam causing sites.
Quiz tests consumers' ability to identify spam causing sites. Last month, McAfee invited web users to spot the undesirable website, in an eight-question quiz entitled: 'Can you… https://www.virusbulletin.com/blog/2006/09/spot-spammer/

Nearly VB 100%

Near misses.
Near misses. In the recent Windows XP comparative review (see VB, June 2006, p.11), VB reported that VirusBuster failed to achieve the results required for a VB 100% award. After… https://www.virusbulletin.com/blog/2006/09/nearly-vb-100/

eBay phishing ups its game

Decent spelling and convincing design aim to trick users.
Decent spelling and convincing design aim to trick users. Users of eBay, perennial subject of phishing scams, are currently being targeted by a more than usually well-crafted… https://www.virusbulletin.com/blog/2006/08/ebay-phishing-ups-its-game/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.