VB Blog

April issue of VB published

Posted by   Virus Bulletin on   Apr 1, 2010

The April issue of Virus Bulletin is now available for subscribers to download.

Read more  

VB2010 conference programme announced

Posted by   Virus Bulletin on   Mar 26, 2010

Schedule for Vancouver security conference announced after bumper crop of submissions.

Read more  

Estonian virus writer sent to jail

Posted by   Virus Bulletin on   Mar 11, 2010

Author of Allapple virus sentenced.

Read more  

Morphing PDFs in new SEO poisoning trick

Posted by   Virus Bulletin on   Mar 5, 2010

Harmless documents replaced by web pages containing malicious code.

Read more  

Botnet taken down as ringleaders are arrested

Posted by   Virus Bulletin on   Mar 3, 2010

'Mariposa' included almost 13 million zombies.

Read more  

March issue of VB published

Posted by   Virus Bulletin on   Mar 1, 2010

The March issue of Virus Bulletin is now available for subscribers to download.

Read more  

Spammers move from China to Russia

Posted by   Virus Bulletin on   Feb 24, 2010

Stricter rules on registering .cn domains leads to increase in malicious .ru domains.

Read more  

Nearly 20% still running IE 6

Posted by   Virus Bulletin on   Feb 22, 2010

VB poll finds users still running outdated browser despite campaigns to boycott it.

Read more  

Warrant issued for arrest of cyclist turned hacker

Posted by   Virus Bulletin on   Feb 17, 2010

Cyclist accused of planting trojan at dope testing lab.

Read more  

Out-of-band patch release from Adobe

Posted by   Virus Bulletin on   Feb 17, 2010

Unscheduled update released by Adobe.

Read more  

Search blog

'Mobile Thursday' at the VB conference

Record number of presentations dedicated to threats affecting smartphones.
Record number of presentations dedicated to threats affecting smartphones. The significant increase in mobile threats is reflected in the VB2013 programme, which includes seven… https://www.virusbulletin.com/blog/2013/09/mobile-thursday-vb-conference/

VB2013 speaker spotlight

We speak to VB2013 presenter Sergey Golovanov about business-to-government malware.
We speak to VB2013 presenter Sergey Golovanov about business-to-government malware. The VB2013 conference takes place this autumn (2-4 October) in Berlin, with an exciting… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-golovanov/

VB2013 last-minute papers and keynote announced

Hot topics to be covered at VB conference in Berlin.
Hot topics to be covered at VB conference in Berlin. We thought that the 45 previously announced VB2013 papers, together with the panel discussion, already made for a really… https://www.virusbulletin.com/blog/2013/09/last-minute-papers-and-keynote-announced/

Backdoored standards show we desperately need more cryptographers

Too few currently possess the skills to verify standards.
Too few currently possess the skills to verify standards. Recent revelations of the NSA's crypto-breaking capabilities have led to calls for better cryptography. But we need more… https://www.virusbulletin.com/blog/2013/09/backdoored-standards-show-we-desperately-need-more-cryptographers/

Syrian conflict used in pump-and-dump spam

Short campaign could have had desired effect.
Short campaign could have had desired effect.Pump-and-dump spam is almost as old as spam itself: emails are sent out promoting worthless 'penny stocks', which have been purchased… https://www.virusbulletin.com/blog/2013/09/syrian-conflict-used-pump-and-dump-spam/

VB2013 speaker spotlight

We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.
We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-serbanoiu/

Box-ticking mentality leads to insecurity

Credit card company fails to understand how authentication works.
Credit card company fails to understand how authentication works. Security experts often bemoan a 'box-ticking' mentality and argue that in many cases ticking boxes doesn't address… https://www.virusbulletin.com/blog/2013/09/box-ticking-mentality-leads-insecurity/

Updated botnet likely cause of surge in Tor traffic

New Tor version should help the network deal with increased traffic.
New Tor version should help the network deal with increased traffic. Sometimes a picture says more than a thousand words: The graph shows the daily number of users of the Tor… https://www.virusbulletin.com/blog/2013/09/updated-botnet-likely-cause-surge-tor-traffic/

Malware spoofing HTTP Host header to hide C&C communication

Traffic appears as requests to Google or Yandex.
Traffic appears as requests to Google or Yandex. There have been several recent examples of malware using a spoofed HTTP Host header to hide communucation with its control servers.… https://www.virusbulletin.com/blog/2013/09/malware-spoofing-http-host-header-hide-c-amp-c-communication/

Phone support scams: an old scam with some new tricks

Files in Prefetch directory supposedly show malware infections.
Files in Prefetch directory supposedly show malware infections. Telephone support scams have been going on for quite a long time, and have received a fair amount of publicity,… https://www.virusbulletin.com/blog/2013/09/phone-support-scams-old-scam-some-new-tricks/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/09/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2013 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2013/09/september-issue-vb-published/

VB2013 speaker spotlight

We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates.
We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates. The VB2013 conference takes place this autumn (2-4 October) in Berlin,… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-blackbirdpfeifer/

Kelihos checks machines' IP addresses against DNS blacklists

Role of node in a botnet dependent on whether the IP address is blacklisted.
Role of node in a botnet dependent on whether the IP address is blacklisted. Whenever I look at the results of the VBSpam tests, it always amazes me how large a percentage of spam… https://www.virusbulletin.com/blog/2013/08/kelihos-checks-machines-ip-addresses-against-dns-blacklists/

New email header attempts to prevent damage of reissued email addresses

Transactional emails not delivered if the account's owner has changed in the meantime.
Transactional emails not delivered if the account's owner has changed in the meantime. When in June, Yahoo announced it would free up inactive user IDs, it received fierce… https://www.virusbulletin.com/blog/2013/08/new-email-header-attempts-prevent-damage-reissued-email-addresses/

VB2013 speaker spotlight

We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective.
We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective. The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-ollmann/

VB2013 speaker spotlight

We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013.
We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013. The VB2013 conference takes place this autumn… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-unuchek/

DNSSEC glitch causes .gov sites to become inaccessible

Name servers unable to distinguish faulty from rogue responses.
Name servers unable to distinguish faulty from rogue responses. A glitch at VeriSign yesterday led to DNSSEC-aware name servers being unable to verify responses on the .gov… https://www.virusbulletin.com/blog/2013/08/dnssec-glitch-causes-gov-sites-become-inaccessible/

Researchers demonstrate how IPv6 can easily be used to perform MitM attacks

Many devices simply waiting for router advertisements, good or evil.
Many devices simply waiting for router advertisements, good or evil. When early last year I was doing research for an article on IPv6 and security, I was surprised to learn how… https://www.virusbulletin.com/blog/2013/08/researchers-demonstrate-how-ipv6-can-easily-be-used-perform-mitm-attacks/

ATM manufacturer pays respects to hacker who broke into its systems

Both Barnaby Jack and Triton showed how white-hat hacking should be done.
Both Barnaby Jack and Triton showed how white-hat hacking should be done. A tribute to the late Barnaby Jack by the company whose systems he hacked shows how hackers can really… https://www.virusbulletin.com/blog/2013/08/atm-manufacturer-pays-respects-hacker-who-broke-its-systems/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.