VB Blog

VB2015 conference programme announced

Posted by   Virus Bulletin on   Mar 31, 2015

From drones to elephants: an exciting range of topics will be covered in Prague.

Read more  

Paper: a timeline of mobile botnets

Posted by   Virus Bulletin on   Mar 30, 2015

Ruchna Nigam provides an overview of more than 60 mobile malware families.

Read more  

Paper: Dylib hijacking on OS X

Posted by   Virus Bulletin on   Mar 19, 2015

Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.

Read more  

Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks

Posted by   Virus Bulletin on   Mar 12, 2015

Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy.

Read more  

Will DIME eventually replace email?

Posted by   Virus Bulletin on   Mar 12, 2015

Protocol has all the advantages of email, yet is orders of magnitude more secure.

Read more  

The ghost of Stuxnet past

Posted by   Virus Bulletin on   Mar 11, 2015

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.

Read more  

Canadian firm fined $1.1m for breaching anti-spam law

Posted by   Virus Bulletin on   Mar 6, 2015

First success story for long-awaited CASL.

Read more  

Virus Bulletin seeks hackers, network researchers for VB2015

Posted by   Virus Bulletin on   Mar 6, 2015

One week left to submit an abstract for the 25th Virus Bulletin conference.

Read more  

VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps

Posted by   Virus Bulletin on   Mar 5, 2015

Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes that can have unintended consequences.

Read more  

FREAK attack takes HTTPS connections back to 1990s security

Posted by   Virus Bulletin on   Mar 4, 2015

Golden keys from the (first) crypto wars have come back to haunt us.

Read more  

Search blog

Paper: Obfuscation in Android malware, and how to fight back

Axelle Apvrille and Ruchna Nigam look at both off-the-shelf products and custom obfuscation techniques.
Axelle Apvrille and Ruchna Nigam look at both off-the-shelf products and custom obfuscation techniques. After a relatively slow start, in recent years mobile malware has really… https://www.virusbulletin.com/blog/2014/07/paper-obfuscation-android-malware-and-how-fight-back/

Virus Bulletin celebrates 25th birthday by making all content free

Neither subscription nor registration required to access content.
Neither subscription nor registration required to access content. Happy birthday Virus Bulletin! Today it is exactly 25 years since, in the very first issue of Virus Bulletin,… https://www.virusbulletin.com/blog/2014/07/celebrates-25th-birthday-making-all-content-free/

July

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/07/

Exploit kit requires link to be clicked before redirection

Automatic analysis of malicious payloads becomes a little bit harder again.
Automatic analysis of malicious payloads becomes a little bit harder again. A security researcher at ESET has discovered how a malicious site serving the Angler exploit kit… https://www.virusbulletin.com/blog/2014/06/exploit-kit-requires-link-be-clicked-redirection/

Cheap Android phone comes shipped with spyware

Trojan masquerades as Google Play app; cannot be removed.
Trojan masquerades as Google Play app; cannot be removed. Researchers at German security firm G Data have discovered Android smartphones that come shipped with spyware. The phone… https://www.virusbulletin.com/blog/2014/06/cheap-android-phone-comes-shipped-spyware/

Virus Bulletin seeks security researchers

Would you like to publish your research through Virus Bulletin - or perhaps even work for us?
Would you like to publish your research through Virus Bulletin - or perhaps even work for us? As of 1 July, all Virus Bulletin content will be freely available to everyone. This… https://www.virusbulletin.com/blog/2014/06/seeks-security-researchers/

Game over for GameOver Zeus botnet?

Coordinated effort against gang that's also behind CryptoLocker ransomware.
Coordinated effort against gang that's also behind CryptoLocker ransomware. A large, coordinated effort involving law enforcement, security vendors and various security… https://www.virusbulletin.com/blog/2014/06/game-over-gameover-zeus-botnet/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/06/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2014 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2014/06/june-issue-vb-published/

Virus Bulletin announces Péter Ször Award

'Brilliant mind and a true gentleman' commemorated through annual award for technical security research.
'Brilliant mind and a true gentleman' commemorated through annual award for technical security research. In commemoration of the life and work of security researcher Péter Ször,… https://www.virusbulletin.com/blog/2014/05/announces-p-ter-sz-r-award/

1 in 500 secure connections use forged certificate

For reasons ranging from relatively good, to actual malware.
For reasons ranging from relatively good, to actual malware. Researchers from Facebook and Carnegie Mellon University have published a paper (PDF) in which they show that out of a… https://www.virusbulletin.com/blog/2014/05/1-500-secure-connections-use-forged-certificate/

May

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/05/

May issue of VB published

The May issue of Virus Bulletin is now available for subscribers to download.
The May issue of Virus Bulletin is now available for subscribers to download. The May 2014 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2014/05/may-issue-vb-published/

AOL spam spreads 'NotCompatible' Android trojan

AOL responds by following Yahoo! in setting strict DMARC policy.
AOL responds by following Yahoo! in setting strict DMARC policy. This week, #AOLhacked has become a popular hashtag on Twitter: many AOL users are using it to complain that their… https://www.virusbulletin.com/blog/2014/04/aol-spam-spreads-notcompatible-android-trojan/

Yahoo's DMARC policy wreaks havoc among mailing lists

Collateral damage in instruction to reject emails with invalid DKIM signatures.
Collateral damage in instruction to reject emails with invalid DKIM signatures. A change in Yahoo's DMARC policy has caused frustration among operators of many mailing lists and… https://www.virusbulletin.com/blog/2014/04/yahoo-s-dmarc-policy-wreaks-havoc-among-mailing-lists/

A week of Heartbleed

OpenSSL vulnerability has kept the security community busy.
OpenSSL vulnerability has kept the security community busy. The 'Heartbleed' vulnerability has kept everyone on their toes over the last week or so - hitting the mainstream media,… https://www.virusbulletin.com/blog/2014/04/week-heartbleed/

VB2014 programme and keynote announced

Exciting range of topics to be covered at VB conference in Seattle this September; Katie Moussouris to deliver keynote address.
Exciting range of topics to be covered at VB conference in Seattle this September; Katie Moussouris to deliver keynote address. Altogether, almost 150 proposals were submitted for… https://www.virusbulletin.com/blog/2014/04/programme-and-keynote-announced/

OpenSSL vulnerability lets attackers quietly steal servers' private keys

Security firm advises regenerating keys and replacing certificates on vulnerable servers.
Security firm advises regenerating keys and replacing certificates on vulnerable servers. A very serious vulnerability in OpenSSL has caused panic among network administrators:… https://www.virusbulletin.com/blog/2014/04/openssl-vulnerability-lets-attackers-quietly-steal-servers-private-keys/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/04/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2014 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2014/04/april-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.