VB Blog

To make Tor work better on the web, we need to be honest about it

Posted by   Martijn Grooten on   May 6, 2016

Many websites put barriers in front of visitors who use the Tor network. If we want to make the web more accessible through Tor, we need to be honest about why this is done, rather than cry wolf about a dislike for privacy, Martijn Grooten says.

Read more  

Paper: How It Works: Steganography Hides Malware in Image Files

Posted by   Martijn Grooten on   Apr 28, 2016

A new paper by CYREN researcher Lordian Mosuela takes a close look at Gatak, or Stegoloader, a piece of malware that was discovered last year and that is controlled via malicious code embedded in a PNG image, a technique known as steganography.

Read more  

Paying a malware ransom is bad, but telling people never to do it is unhelpful advice

Posted by   Martijn Grooten on   Apr 26, 2016

The current ransomware plague is one of the worst threats the Internet has seen and it is unlikely to go away any time soon. But telling people to never pay the ransom is unhelpful advice.

Read more  

VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers

Posted by   Martijn Grooten on   Apr 22, 2016

In his VB2015 paper, Martin Korman presented his 'VolatilyBot' tool, which extracts malicious code from packed binaries, leveraging the functionality of the Volatility Framework.

Read more  

VB2016 programme announced, registration opened

Posted by   Martijn Grooten on   Apr 21, 2016

We have announced 37 papers (and four reserve papers) that will be presented at VB2016 in Denver, Colorado, USA in October. Registration for the conference has opened; make sure you register before 1 July to benefit from a 10% early bird discount.

Read more  

New tool helps ransomware victims indentify the malware family

Posted by   Martijn Grooten on   Apr 15, 2016

The people behind the MalwareHunterTeam have released a tool that helps victims of ransomware identify which of more than 50 families has infected their system, something which could help them find a tool to decrypt their files.

Read more  

It's fine for vulnerabilities to have names — we just need not to take them too seriously

Posted by   Martijn Grooten on   Apr 13, 2016

The PR campaign around the Badlock vulnerability backfired when it turned out that the vulnerability wasn't as serious as had been suggested. But naming vulnerabilities can actually be helpful and certainly shouldn't hurt.

Read more  

Throwback Thursday: The Number of the Beasts

Posted by   Helen Martin on   Apr 7, 2016

The Virus Bulletin Virus Prevalence Table, which ran from 1992 until 2013, gave users a regular snapshot of what was really going on in the virus (and later malware) world, recording the number of incidents of each virus reported to VB in the preceding month. In August 2000, Denis Zenkin, a self-confessed virus prevalence table junkie, shared his findings following a study of the virus prevalence tables over the preceding few years, allowing him to determine the top ten viruses of the period, the top viruses by type and the viruses of the year.

Read more  

Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings

Posted by   Martijn Grooten on   Mar 30, 2016

Security researcher Andreas Lindh recently found a vulnerability in Apache OpenMeetings that could allow remote code execution on a vulnerable server. Andreas reported the vulnerability to the OpenMeetings developers and, once it had been patched, he wrote up the details.

Read more  

Throwback Thursday: 'In the Beginning was the Word...'

Posted by   Helen Martin on   Mar 24, 2016

Word and Excel’s internal file formats used to be something in which few were interested – until macro viruses came along and changed all that. In 1996, Andrew Krukov provided an overview of the new breed of viruses.

Read more  

Search blog

Google AdWords phishing campaign spreads

Users urged to login because of 'issues'.
Users urged to login because of 'issues'. A new phishing campaign that targets users of Google AdWords looks worryingly real, GFI reports. The phish begins with an email claiming… https://www.virusbulletin.com/blog/2011/10/google-adwords-phishing-campaign-spreads/

Google delists all .co.cc domains from its index

Large fraction of sites deemed 'spammy or low-quality'.
Large fraction of sites deemed 'spammy or low-quality'.Google has removed all sites running on subdomains of .co.cc from its search engine index as the company believes too large a… https://www.virusbulletin.com/blog/2011/07/google-delists-all-co-cc-domains-its-index/

Google acquires Zynamics

Internet giant buys into security.
Internet giant buys into security. Internet giant Google has acquired software analytics firm Zynamics, it was announced yesterday. The German company, which was founded in 2004… https://www.virusbulletin.com/blog/2011/03/google-acquires-zynamics/

Android SMS trojan goes wild

Premium-rate text scam shows growing cracks in smart phone security.
Premium-rate text scam shows growing cracks in smart phone security. The first known SMS trojan affecting smart phones running Google's Android operating system has been observed… https://www.virusbulletin.com/blog/2010/08/android-sms-trojan-goes-wild/

Morphing PDFs in new SEO poisoning trick

Harmless documents replaced by web pages containing malicious code.
Harmless documents replaced by web pages containing malicious code. Researchers at F-Secure have discovered a new SEO poisoning trick in which attackers put harmless PDFs on a… https://www.virusbulletin.com/blog/2010/03/morphing-pdfs-new-seo-poisoning-trick/

Security holes trouble vendors

Vulnerabilities fixed in McAfee website and Google Chrome; patch expected for Adobe Reader.
Vulnerabilities fixed in McAfee website and Google Chrome; patch expected for Adobe Reader. A range of vulnerabilities have been causing headaches recently for companies… https://www.virusbulletin.com/blog/2009/05/security-holes-trouble-vendors/

Google shows off in-house browser beta

Open-source 'Chrome' promises security as well as efficiency.
Open-source 'Chrome' promises security as well as efficiency. Ever-expanding web giant Google has released an early version of its own browser, developed in house but under… https://www.virusbulletin.com/blog/2008/09/google-shows-house-browser-beta/

China hosting over half of malicious sites

StopBadware.org report highlights Chinese dominance in web malware.
StopBadware.org report highlights Chinese dominance in web malware. A report from StopBadware.org released last week found that 52% of malicious websites were hosted in China, with… https://www.virusbulletin.com/blog/2008/06/china-hosting-over-half-malicious-sites/

Spammers turn to DoubleClick for open redirect

Loophole in Google's AdSense solved, but new flaw quickly uncovered.
Loophole in Google's AdSense solved, but new flaw quickly uncovered. The good name of web giant Google continues to be a popular source of legitimacy among spammers, despite their… https://www.virusbulletin.com/blog/2008/06/spammers-turn-doubleclick-open-redirect/

Google Groups and Blogspot used to serve malware

Company finds own IP address to be serving most malware.
Company finds own IP address to be serving most malware.Malware writers have created thousands of Google Groups with the sole purpose of serving malware, Sunbelt reports. On the… https://www.virusbulletin.com/blog/2008/04/google-groups-and-blogspot-used-serve-malware/

'Search engines should do more to fight malware'

85% of users think that search engines should be doing more.
85% of users think that search engines should be doing more. According to a recent poll, 85% of visitors to the VB website think that search engines should be doing more to fight… https://www.virusbulletin.com/blog/2008/03/search-engines-should-do-more-fight-malware/

Gmail CAPTCHA cracked

Twenty per cent success rate sufficient to create thousands of spam accounts.
Twenty per cent success rate sufficient to create thousands of spam accounts.Gmail has become the latest free webmail service to have its CAPTCHAs cracked by spammers. Following… https://www.virusbulletin.com/blog/2008/02/gmail-captcha-cracked/

Over 1 per cent of search results include malicious sites

Google research paper confirms significant increase in number of malware-serving websites.
Google research paper confirms significant increase in number of malware-serving websites. Recent reports of increasing numbers of websites serving malicious content have been… https://www.virusbulletin.com/blog/2008/02/over-1-cent-search-results-include-malicious-sites/

Ledger poisons Google

Actor's death exploited by malware writers to infect computers.
Actor's death exploited by malware writers to infect computers. The death of actor Heath Ledger on Tuesday had barely been confirmed a few hours when malicious websites started… https://www.virusbulletin.com/blog/2008/01/ledger-poisons-google/

No taste for spam?

ICANN takes steps to combat domain tasting.
ICANN takes steps to combat domain tasting. The practice of domain tasting, often used by spammers and other shady types to register tens of thousands of Internet domain names at… https://www.virusbulletin.com/blog/2008/01/no-taste-spam/

Symantec warns of rigged Google search links

Advanced search options lead clickers straight to junk sites.
Advanced search options lead clickers straight to junk sites. Spammers have found a novel use for Google's advanced search options and 'I'm Feeling Lucky' function, using a… https://www.virusbulletin.com/blog/2007/11/symantec-warns-rigged-google-search-links/

Another security hole found in GMail

Vulnerability latest in a growing list of holes in Google's web applications.
Vulnerability latest in a growing list of holes in Google's web applications. A significant security hole has been found in Google's web mail application GMail. Security… https://www.virusbulletin.com/blog/2007/09/another-security-hole-found-gmail/

Google buys Postini

Managed security service snapped up by giant.
Managed security service snapped up by giant. Ever-expanding web giant Google has continued its growth into both security and software-as-service spheres with the $625 million… https://www.virusbulletin.com/blog/2007/07/google-buys-postini/

Online malware dangers analysed

Google, McAfee release webserver, search result figures.
Google, McAfee release webserver, search result figures. Two reports out this week have revealed some interesting statistics on the security dangers involved in browsing the… https://www.virusbulletin.com/blog/2007/06/online-malware-dangers-analysed/

Google buys into security

Google makes stealth purchase of security firm.
Google makes stealth purchase of security firm. Search and entertainment giant Google completed the purchase of Internet security firm GreenBorder Technologies in mid-May - but… https://www.virusbulletin.com/blog/2007/05/google-buys-security/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.