VB Blog

New Zeus/SpyEye botnet does away with command-and-control servers

Posted by   Virus Bulletin on   Feb 22, 2012

Increasing use of UDP to avoid communication tracking.

Read more  

200-fold increase in HTML-attachment spam

Posted by   Virus Bulletin on   Feb 16, 2012

Cutwail botnet likely behind campaign that sends users to Phoenix exploit kit.

Read more  

'Hotmail and Gmail have best spam filter' says Cascade spam test

Posted by   Virus Bulletin on   Feb 15, 2012

Comparative test did not take false positives into account.

Read more  

February issue of VB published

Posted by   Virus Bulletin on   Feb 1, 2012

The February issue of Virus Bulletin is now available for subscribers to download.

Read more  

Hacktivists hijack DNS of popular websites

Posted by   Virus Bulletin on   Jan 26, 2012

Security at registrars may be weak link.

Read more  

New RFC describes best practices for running DNS-based lists

Posted by   Virus Bulletin on   Jan 24, 2012

DNSBL users advised to avoid those lists that charge for delisting.

Read more  

Vulnerability turns McAfee's anti-malware solution into open relay

Posted by   Virus Bulletin on   Jan 19, 2012

Flaw allows for spam to be sent through customers' PCs.

Read more  

AV-Test releases latest results

Posted by   Virus Bulletin on   Jan 18, 2012

Business and consumer products achieve high pass rate.

Read more  

Sykipot trojan used to target smart cards

Posted by   Virus Bulletin on   Jan 13, 2012

Defence companies among small number of targets.

Read more  

Spammers link to site containing QR code

Posted by   Virus Bulletin on   Jan 10, 2012

Curious users may scan URL and end up on pharma websites.

Read more  

Search blog

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/10/

VB2015 'Steganoprague' competition

Use your steganography-detection skills and win a pile of books.
Use your steganography-detection skills and win a pile of books. As VB2015 is about to begin, we announce the second part of the 'Steganoprague' competition. In this part, you will… https://www.virusbulletin.com/blog/2015/09/steganoprague-competition/

Throwback Thursday: The First International Virus Bulletin Conference

This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey.
This Throwback Thursday, we turn the clock back to October 1991 to take a look back at the first ever VB Conference: VB'91 in Jersey. With VB2015, the 25th Virus Bulletin… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-first-international-conference/

Researchers seek ransomware samples for their generic solution

VB2015 presentation to include demonstration of technique against recent samples.
VB2015 presentation to include demonstration of technique against recent samples. 'The scary hack that's on the rise' is how Wired's Kim Zetter described ransomware in an overview… https://www.virusbulletin.com/blog/2015/09/researchers-seek-ransomware-samples-their-generic-solution/

Throwback Thursday: Virus Writer and Distributors 'Attributable Viruses'

This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses. This week saw the confession of a… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-virus-writer-and-distributors-attributable-viruses/

VB2015 last-minute papers announced

Ten talks covering hot research added to the VB2015 programme.
Ten talks covering hot research added to the VB2015 programme. There are just over two weeks to go until more than 400 security professionals descend on Prague for VB2015, the 25th… https://www.virusbulletin.com/blog/2015/09/last-minute-papers-announced/

Paper: Custom packer defeats multiple automation systems

Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder.
Combination of anti-automation, anti-VM and anti-reverse engineering to make researchers' lives harder. Ever since the number of new malware samples became so large we could no… https://www.virusbulletin.com/blog/2015/09/paper-custom-packer-defeats-multiple-automation-systems/

Throwback Thursday: Computer Viruses: Electronically Transmitted Disease?

This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses.
This Throwback Thursday, we turn the clock back to March 2003, when VB reported on a piece of research investigating the psychological toll inflicted by computer viruses. One could… https://www.virusbulletin.com/blog/2015/09/throwback-thursday-computer-viruses-electronically-transmitted-disease/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/09/

VB2015: some important information

Last-minute papers, steganography competition and foosball tournament.
Last-minute papers, steganography competition and foosball tournament. We're just a little over a month away from the beginning of VB2015, the 25th Virus Bulletin International… https://www.virusbulletin.com/blog/2015/08/some-important-information/

Throwback Thursday: Safe Hex in the 21st Century

This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough.
This Throwback Thursday, we turn the clock back to July 2000, when we were already being warned that virus scanners were no longer enough. How many times have we heard commentators… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-safe-hex-21st-century/

Paper: Not a GAMe maKER

Raul Alvarez performs low-level analysis of information-stealing trojan.
Raul Alvarez performs low-level analysis of information-stealing trojan. The Gamker information-stealing trojan (also known as Shiz) has been around for a few years. It made the… https://www.virusbulletin.com/blog/2015/08/paper-not-game-maker/

VB2015 preview: advanced persistent threats

Several conference papers to deal with targeted attacks.
Several conference papers to deal with targeted attacks. There was a time when analyses of malware and viruses at the Virus Bulletin conference used the number of infections as a… https://www.virusbulletin.com/blog/2015/08/preview-advanced-persistent-threats/

Throwback Thursday: The Virus Analyst Headache

This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity and volume of viruses was proving a headache.
This Throwback Thursday, we turn the clock back to April 1999, when the average virus analyst had to manually process around ten or more viruses per day, and the growing complexity… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-virus-analyst-headache/

Back to the future: anti-virus engines and sandboxes

Szilard Stange makes the case for multi-engine malware scanning.
Szilard Stange makes the case for multi-engine malware scanning.The VB2015 conference takes place next month (30 September to 2 October) in Prague, with an exciting programme that… https://www.virusbulletin.com/blog/2015/08/back-future-anti-virus-engines-and-sandboxes/

Catch rates bounce back in latest spam filter test

Products defy prediction of tougher circumstances.
Products defy prediction of tougher circumstances. When spam levels were recently reported to have dropped below 50% for the first time in 12 years, I wrote that it was 'not… https://www.virusbulletin.com/blog/2015/08/catch-rates-bounce-back-latest-spam-filter-test/

Paper: Life after the apocalypse for the Middle Eastern NJRat campaign

Malware authors upped their game following 2014 disruption of No-IP.
Malware authors upped their game following 2014 disruption of No-IP. In June last year, somewhat controversially Microsoft moved against dynamic DNS provider No-IP and seized 22 of… https://www.virusbulletin.com/blog/2015/08/paper-life-after-apocalypse-middle-eastern-njrat-campaign/

Throwback Thursday: IT Security Breaches: The 1994 NCC Survey

This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost?
This Throwback Thursday, we turn the clock back to November 1994, when VB asked: what is the nature of the real virus problem, and how much does it cost? Year after year, we see… https://www.virusbulletin.com/blog/2015/08/throwback-thursday-it-security-breaches-1994-ncc-survey/

VB2015 preview: the Internet of Things

Experts to cover various aspects of IoT (in)security in a range of talks.
Experts to cover various aspects of IoT (in)security in a range of talks. As a reader of this blog, and hopefully as someone who will attend VB2015, you don't need to be told that… https://www.virusbulletin.com/blog/2015/08/preview-internet-things/

Paper: Hype heuristics, signatures and the death of AV (again)

David Harley responds to anti-malware's many criticasters.
David Harley responds to anti-malware's many criticasters. Anti-virus is dead. After all, in the current threat landscape, who would use a system that relies on signatures of… https://www.virusbulletin.com/blog/2015/08/paper-hype-heuristics-signatures-and-death-av-again/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.