VB Blog

Small Talks return to the Virus Bulletin Conference

Posted by   Martijn Grooten on   Aug 26, 2016

Following their success last year, this year a series of "Small Talks" return to the VB2016 conference programme. We are pleased to announce the details of six of these talks, covering subjects that range from the Chinese cybercriminal underground to Android security, the Tor Project, and exploit kits.

Read more  

Research shows web security products perform well against exploit kits

Posted by   Martijn Grooten on   Aug 24, 2016

Research by Virus Bulletin, in which five web security products were served 54 live exploit kits, shows that the products blocked between 87 and 100 per cent of the kits.

Read more  

Throwback Thursday: Olympic Games

Posted by   Helen Martin on   Aug 2, 2016

In 1994, along with the Olympic Games came an Olympic virus, from a group of Swedish virus authors calling themselves ‘Immortal Riot’. We look back at Mikko Hyppönen's analysis in the VB archive.

Read more  

VB2016 call for last-minute papers opened, discounts announced

Posted by   Martijn Grooten on   Aug 1, 2016

Announcing the VB2016 call for last-minute papers and a number of discounts on the conference registration rate.

Read more  

Guest Blog: Malicious Scripts Gaining Prevalence in Brazil

Posted by   Virus Bulletin on   Jul 28, 2016

In the run up to VB2016, we invited the conference sponsors to write guest posts for our blog. In the second of this series, ESET's Matías Porolli writes about malicious Visual Basic and JavaScript gaining prevalence in Brazil.

Read more  

Romanian university website compromised to serve Neutrino exploit kit

Posted by   Martijn Grooten on   Jul 28, 2016

The website of the Carol Davila University of Medicine and Pharmacy has been compromised to inject a hidden iframe into the site's source code that serves the Neutrino exploit kit and may infect visitors with ransomware.

Read more  

It's 2016. Can we stop using MD5 in malware analyses?

Posted by   Martijn Grooten on   Jul 26, 2016

While there are no actually risks involved in using MD5s in malware analyses, it reinforces bad habits and we should all start using SHA-256 instead.

Read more  

Throwback Thursday: Holding the Bady

Posted by   Helen Martin on   Jul 21, 2016

In 2001, ‘Code Red’ caused White House administrators to change the IP address of the official White House website, and even penetrated Microsoft’s own IIS servers.

Read more  

Paper: The Journey of Evasion Enters Behavioural Phase

Posted by   Martijn Grooten on   Jul 20, 2016

A new paper by FireEye researcher Ankit Anubhav provides an overview of evasion techniques applied by recently discovered malware.

Read more  

Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe

Posted by   Virus Bulletin on   Jul 15, 2016

Recently, ESET researchers uncovered a new espionage toolkit targeting targeting Central and Eastern Europe. They provide some details in a guest post.

Read more  

Search blog

DMARC: an imperfect solution that can make a big difference

US Senator Ron Wyden has asked the Department of Homeland Security to implement DMARC. Martijn Grooten looks at what difference this could make for phishing attacks impersonating the US federal governent.
US Senator Ron Wyden has written a letter (pdf) to the Department of Homeland Security, urging the US government to implement DMARC to "ensure hackers cannot send emails that… https://www.virusbulletin.com/blog/2017/07/dmarc-imperfect-solution-can-make-big-difference/

TorrentLocker spam has DMARC enabled

Use of email authentication technique unlikely to bring any advantage.
Use of email authentication technique unlikely to bring any advantage. Last week, Trend Micro researcher Jon Oliver (who presented a paper on Twitter abuse at VB2014) wrote an… https://www.virusbulletin.com/blog/2015/03/torrentlocker-spam-has-dmarc-enabled/

Impressive results in latest VBSpam test

Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate.
Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate. No fewer than ten anti-spam solutions… https://www.virusbulletin.com/blog/2013/02/impressive-results-latest-vbspam-test/

EU report suggests 95% of email is spam

Less than five per cent of all SMTP connections result in an email being delivered into a user's inbox.
Less than five per cent of all SMTP connections result in an email being delivered into a user's inbox. A survey carried out by the European Network and Information Security Agency… https://www.virusbulletin.com/blog/2010/01/eu-report-suggests-95-email-spam/

VB announces latest VBSpam certification results

Two products achieve top level VBSpam Platinum award.
Two products achieve top level VBSpam Platinum award. Virus Bulletin has announced the results of its second comparative review of anti-spam products, revealing two top-level… https://www.virusbulletin.com/blog/2009/07/vb-announces-latest-vbspam-certification-results/

DKIM usage shows significant growth

US banks urged to use authentication method
US banks urged to use authentication method In a report on its website, Internet giant Cisco states it has been seeing almost 700,000 non-spam messages that contain valid DKIM… https://www.virusbulletin.com/blog/2009/06/dkim-usage-shows-significant-growth/

Unsafe computing in abundance

Reports and statistics on unsafe computing practices.
Reports and statistics on unsafe computing practices. Last month saw a flurry of reports and statistics on unsafe computing practices. To kick off, almost a quarter of… https://www.virusbulletin.com/blog/2007/09/unsafe-computing-abundance/

Sender authentication checks on the rise

SPF records creep into top ten content triggers checked by ISPs.
SPF records creep into top ten content triggers checked by ISPs. A report by email marketing software provider Lyris has revealed that use of the Sender Policy Framework (SPF)… https://www.virusbulletin.com/blog/2007/09/sender-authentication-checks-rise/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.