VB Blog

Out-of-band patch released for all Windows versions

Posted by   Virus Bulletin on   Nov 19, 2014

Kerberos bug means one set of credentials suffices to rule them all.

Read more  

VB2014 paper: Optimized mal-ops. Hack the ad network like a boss

Posted by   Virus Bulletin on   Nov 18, 2014

Why buying ad space makes perfect sense for those wanting to spread malware.

Read more  

Book review: Bulletproof SSL and TLS

Posted by   Virus Bulletin on   Nov 17, 2014

Must-read for anyone working with one of the Internet's most important protocols.

Read more  

VB2014 paper: Bootkits: past, present & future

Posted by   Virus Bulletin on   Nov 12, 2014

Despite better defences, the era of bootkits is certainly not behind us.

Read more  

Stuxnet infected Natanz plant via carefully selected targets rather than escape from it

Posted by   Virus Bulletin on   Nov 11, 2014

Five initial victims of infamous worm named.

Read more  

VB2014 paper: Apple without a shell - iOS under targeted attack

Posted by   Virus Bulletin on   Nov 10, 2014

Developer Enterprise Program recently found to be used by WireLurker.

Read more  

Macro malware on the rise again

Posted by   Virus Bulletin on   Nov 7, 2014

Users taught that having to enable enhanced security features is no big deal.

Read more  

VB2014 video: Attack points in health apps & wearable devices - how safe is your quantified self?

Posted by   Virus Bulletin on   Nov 7, 2014

Health apps and wearable devices found to make many basic security mistakes.

Read more  

WireLurker malware infects iOS devices through OS X

Posted by   Virus Bulletin on   Nov 6, 2014

Non-jailbroken devices infected via enterprise provisioning program.

Read more  

VB2014 paper: DMARC - how to use it to improve your email reputation

Posted by   Virus Bulletin on   Nov 6, 2014

Terry Zink presents case study in which he describes setting a DMARC policy for Microsoft.

Read more  

Search blog

'Mobile Thursday' at the VB conference

Record number of presentations dedicated to threats affecting smartphones.
Record number of presentations dedicated to threats affecting smartphones. The significant increase in mobile threats is reflected in the VB2013 programme, which includes seven… https://www.virusbulletin.com/blog/2013/09/mobile-thursday-vb-conference/

VB2013 speaker spotlight

We speak to VB2013 presenter Sergey Golovanov about business-to-government malware.
We speak to VB2013 presenter Sergey Golovanov about business-to-government malware. The VB2013 conference takes place this autumn (2-4 October) in Berlin, with an exciting… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-golovanov/

VB2013 last-minute papers and keynote announced

Hot topics to be covered at VB conference in Berlin.
Hot topics to be covered at VB conference in Berlin. We thought that the 45 previously announced VB2013 papers, together with the panel discussion, already made for a really… https://www.virusbulletin.com/blog/2013/09/last-minute-papers-and-keynote-announced/

Backdoored standards show we desperately need more cryptographers

Too few currently possess the skills to verify standards.
Too few currently possess the skills to verify standards. Recent revelations of the NSA's crypto-breaking capabilities have led to calls for better cryptography. But we need more… https://www.virusbulletin.com/blog/2013/09/backdoored-standards-show-we-desperately-need-more-cryptographers/

Syrian conflict used in pump-and-dump spam

Short campaign could have had desired effect.
Short campaign could have had desired effect.Pump-and-dump spam is almost as old as spam itself: emails are sent out promoting worthless 'penny stocks', which have been purchased… https://www.virusbulletin.com/blog/2013/09/syrian-conflict-used-pump-and-dump-spam/

VB2013 speaker spotlight

We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.
We speak to VB2013 presenter Andrei Serbanoiu about Facebook ad spam and scams, and what he aims to bring to VB2013.The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/09/speaker-spotlight-serbanoiu/

Box-ticking mentality leads to insecurity

Credit card company fails to understand how authentication works.
Credit card company fails to understand how authentication works. Security experts often bemoan a 'box-ticking' mentality and argue that in many cases ticking boxes doesn't address… https://www.virusbulletin.com/blog/2013/09/box-ticking-mentality-leads-insecurity/

Updated botnet likely cause of surge in Tor traffic

New Tor version should help the network deal with increased traffic.
New Tor version should help the network deal with increased traffic. Sometimes a picture says more than a thousand words: The graph shows the daily number of users of the Tor… https://www.virusbulletin.com/blog/2013/09/updated-botnet-likely-cause-surge-tor-traffic/

Malware spoofing HTTP Host header to hide C&C communication

Traffic appears as requests to Google or Yandex.
Traffic appears as requests to Google or Yandex. There have been several recent examples of malware using a spoofed HTTP Host header to hide communucation with its control servers.… https://www.virusbulletin.com/blog/2013/09/malware-spoofing-http-host-header-hide-c-amp-c-communication/

Phone support scams: an old scam with some new tricks

Files in Prefetch directory supposedly show malware infections.
Files in Prefetch directory supposedly show malware infections. Telephone support scams have been going on for quite a long time, and have received a fair amount of publicity,… https://www.virusbulletin.com/blog/2013/09/phone-support-scams-old-scam-some-new-tricks/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/09/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2013 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2013/09/september-issue-vb-published/

VB2013 speaker spotlight

We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates.
We speak to Joe Blackbird and Bill Pfeifer about how anti-malware protection states affect infection rates. The VB2013 conference takes place this autumn (2-4 October) in Berlin,… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-blackbirdpfeifer/

Kelihos checks machines' IP addresses against DNS blacklists

Role of node in a botnet dependent on whether the IP address is blacklisted.
Role of node in a botnet dependent on whether the IP address is blacklisted. Whenever I look at the results of the VBSpam tests, it always amazes me how large a percentage of spam… https://www.virusbulletin.com/blog/2013/08/kelihos-checks-machines-ip-addresses-against-dns-blacklists/

New email header attempts to prevent damage of reissued email addresses

Transactional emails not delivered if the account's owner has changed in the meantime.
Transactional emails not delivered if the account's owner has changed in the meantime. When in June, Yahoo announced it would free up inactive user IDs, it received fierce… https://www.virusbulletin.com/blog/2013/08/new-email-header-attempts-prevent-damage-reissued-email-addresses/

VB2013 speaker spotlight

We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective.
We speak to Gunter Ollmann about the growing need to assess corporate security defences from a hacker's perspective. The VB2013 conference takes place this autumn (2-4 October) in… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-ollmann/

VB2013 speaker spotlight

We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013.
We speak to Roman Unuchek about malicious redirection of mobile users, his research interests, and what he aims to bring to VB2013. The VB2013 conference takes place this autumn… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-unuchek/

DNSSEC glitch causes .gov sites to become inaccessible

Name servers unable to distinguish faulty from rogue responses.
Name servers unable to distinguish faulty from rogue responses. A glitch at VeriSign yesterday led to DNSSEC-aware name servers being unable to verify responses on the .gov… https://www.virusbulletin.com/blog/2013/08/dnssec-glitch-causes-gov-sites-become-inaccessible/

Researchers demonstrate how IPv6 can easily be used to perform MitM attacks

Many devices simply waiting for router advertisements, good or evil.
Many devices simply waiting for router advertisements, good or evil. When early last year I was doing research for an article on IPv6 and security, I was surprised to learn how… https://www.virusbulletin.com/blog/2013/08/researchers-demonstrate-how-ipv6-can-easily-be-used-perform-mitm-attacks/

VB2013 speaker spotlight

We speak to VB2013 presenters Ilya Rabinovich and Randy Abrams about their research, Windows 8 security, and what they aim to bring to VB2013.
We speak to VB2013 presenters Ilya Rabinovich and Randy Abrams about their research, Windows 8 security, and what they aim to bring to VB2013. The VB2013 conference takes place… https://www.virusbulletin.com/blog/2013/08/speaker-spotlight-rabinovich-abrams/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.