VB Blog

VB2014 preview: Apple without a shell - iOS under targeted attack

Posted by   Virus Bulletin on   Sep 12, 2014

FireEye researchers show a large attack vector for Apple's mobile operating system.

Read more  

Left-to-right override makes a return in spam

Posted by   Virus Bulletin on   Sep 11, 2014

Trick shows that spammers still try to beat content-based filters.

Read more  

Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part two

Posted by   Virus Bulletin on   Sep 11, 2014

Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine.

Read more  

Crypto blunder makes TorrentLocker easy to crack

Posted by   Virus Bulletin on   Sep 10, 2014

Use of single XOR key leaves ransomware open to known-plaintext attack.

Read more  

VB2014 preview: The three levels of exploit testing

Posted by   Virus Bulletin on   Sep 9, 2014

Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.

Read more  

VB2014 preview: last-minute papers added to the programme

Posted by   Virus Bulletin on   Sep 5, 2014

Hot topics to be covered at VB2014 conference in Seattle.

Read more  

Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part one

Posted by   Virus Bulletin on   Sep 3, 2014

Aditya K. Sood and Rohit Bansal dissect botnet primarily used for financial fraud.

Read more  

VB2014 preview: Swipe away, we're watching you

Posted by   Virus Bulletin on   Sep 2, 2014

Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.

Read more  

VB2014 preview: Design to discover: security analytics with 3D visualization engine

Posted by   Virus Bulletin on   Aug 29, 2014

Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains.

Read more  

Srizbi kernel-mode spambot reappears as Pitou

Posted by   Virus Bulletin on   Aug 28, 2014

Malware possibly still in the 'brewing' stage.

Read more  

Search blog

Do we need stronger email addresses?

Skype vulnerability allowed for account hijacking using only email address.
Skype vulnerability allowed for account hijacking using only email address. A worryingly trivial vulnerability in VoIP service Skype became public this morning, which allowed… https://www.virusbulletin.com/blog/2012/11/do-we-need-stronger-email-addresses/

November issue of VB published

The November issue of Virus Bulletin is now available for subscribers to download.
The November issue of Virus Bulletin is now available for subscribers to download. The November 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/11/november-issue-vb-published/

November

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/11/

FBI agent receives first J.D. Falk award

Thomas X. Grasso praised for starting DNSChanger working group.
Thomas X. Grasso praised for starting DNSChanger working group. The first annual J.D. Falk award has been given to FBI agent Thomas X. Grasso for establishing the DNSChanger… https://www.virusbulletin.com/blog/2012/10/fbi-agent-receives-first-j-d-falk-award/

Weak cryptography keys allow others to add valid DKIM signatures to fake emails

512-bit key cracked within 72 hours.
512-bit key cracked within 72 hours. A Florida-based mathematician has caused a stir in the email community by adding a valid DKIM signature for google.com to an email after… https://www.virusbulletin.com/blog/2012/10/weak-cryptography-keys-allow-others-add-valid-dkim-signatures-fake-emails/

One in ten spam messages contains drive-by download link

80-fold increase in one month.
80-fold increase in one month. I do not think I am unique in that I can recognize (most) phishing pages from a mile away and that I know that, if I ever wanted to buy… https://www.virusbulletin.com/blog/2012/10/one-ten-spam-messages-contains-drive-download-link/

Anti-virus software significantly shortens life of banking trojans

Security software causes malware to run for less than a third as long.
Security software causes malware to run for less than a third as long. 'Does anti-virus software actually help?' is a question often asked, even by security experts - who point to… https://www.virusbulletin.com/blog/2012/10/anti-virus-software-significantly-shortens-life-banking-trojans/

VGrep: the rose revived

Virus Bulletin relaunches anti-malware name matching tool.
Virus Bulletin relaunches anti-malware name matching tool. 'That which we call a rose, By any other name would smell as sweet.' So wrote Shakespeare in Romeo and Juliet. And anyone… https://www.virusbulletin.com/blog/2012/10/vgrep-rose-revived/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/10/

October issue of VB published

The October issue of Virus Bulletin is now available for subscribers to download.
The October issue of Virus Bulletin is now available for subscribers to download. The October 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/10/october-issue-vb-published/

Microsoft releases advisory offering workarounds for IE vulnerability

German government advises users to use alternative browser.
German government advises users to use alternative browser.Microsoft has released a security advisory to address the zero-day vulnerability in its Internet Explorer browser that we… https://www.virusbulletin.com/blog/2012/09/microsoft-releases-advisory-offering-workarounds-ie-vulnerability/

Internet Explorer zero-day used in the wild

Dropped PoisonIvy trojan linked to 'Nitro' attacks.
Dropped PoisonIvy trojan linked to 'Nitro' attacks. Security researcher Eric Romang has discovered a new zero-day vulnerability in Internet Explorer that is currently being used in… https://www.virusbulletin.com/blog/2012/09/internet-explorer-zero-day-used-wild/

Air Force Major Abacha Tunde needs your help

419 scam asks you to help release funds to get Nigerian astronaut back to earth.
419 scam asks you to help release funds to get Nigerian astronaut back to earth. A few months ago, Microsoft researcher Cormac Herley published a paper "Why do Nigerian Scammers… https://www.virusbulletin.com/blog/2012/09/air-force-major-abacha-tunde-needs-your-help/

VB2012 last-minute papers announced

Hot topics to be covered at VB conference in Dallas.
Hot topics to be covered at VB conference in Dallas. For the last six years, VB has set aside a section of the VB conference for 'last-minute' papers, the idea being that… https://www.virusbulletin.com/blog/2012/09/last-minute-papers-announced/

Gach do bonn a mbaineann a chur chugainn

Why cybercriminals may have a reason for using Irish language in a ransomware scam.
Why cybercriminals may have a reason for using Irish language in a ransomware scam. According to a story that made the security headlines this weekend, and which seems to orginate… https://www.virusbulletin.com/blog/2012/09/gach-do-bonn-mbaineann-chur-chugainn/

From spear phishing to watering holes

Symantec reports increase in 'watering hole attacks'.
Symantec reports increase in 'watering hole attacks'. Imagine that for some reason you wanted to gain access to my computer. One thing you could do is send me an email with some… https://www.virusbulletin.com/blog/2012/09/spear-phishing-watering-holes/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/09/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2012 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2012/09/september-issue-vb-published/

August

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/08/

August issue of VB published

The August issue of Virus Bulletin is now available for subscribers to download.
The August issue of Virus Bulletin is now available for subscribers to download. The August 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/08/august-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.