VB Blog

Call for Papers: VB2015 Prague

Posted by   Virus Bulletin on   Dec 19, 2014

VB seeks submissions for the 25th Virus Bulletin Conference.

Read more  

Book review: Countdown to Zero Day

Posted by   Virus Bulletin on   Dec 18, 2014

Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics.

Read more  

Virus Bulletin announces platinum sponsors for VB2015

Posted by   Virus Bulletin on   Dec 16, 2014

More sponsorship opportunities available.

Read more  

VB2014 paper: Smart home appliance security and malware

Posted by   Virus Bulletin on   Dec 15, 2014

Jeongwook Oh demonstrates how to hack a Samsung smart TV.

Read more  

Virus Bulletin is hiring

Posted by   Virus Bulletin on   Dec 8, 2014

VB seeks a Perl Developer / Security Engineer.

Read more  

Conference report: VB2014

Posted by   Virus Bulletin on   Nov 28, 2014

The biggest and broadest ranging Virus Bulletin conference ever was a great success.

Read more  

VB2014 paper: Labelling spam through the analysis of protocol patterns

Posted by   Virus Bulletin on   Nov 26, 2014

What do your IP packet sizes say about whether you're a spammer?

Read more  

Detekt tool searches PCs for traces of surveillance spyware

Posted by   Virus Bulletin on   Nov 24, 2014

Second opinion essential in circumstances under which likely victims operate.

Read more  

Multi-staged, modular Regin tool enables stealthy surveillance

Posted by   Virus Bulletin on   Nov 24, 2014

Nation state likely behind campaign that goes back many years.

Read more  

VB2014 paper: Sweeping the IP space: the hunt for evil on the Internet

Posted by   Virus Bulletin on   Nov 21, 2014

Dhia Mahjoub explains how the topology of the AS graph can be used to uncover hotspots of maliciousness.

Read more  

Search blog

'Son of Stuxnet' trojan found

'Duqu' used in targeted attacks to steal specific information.
'Duqu' used in targeted attacks to steal specific information. Researchers at both Symantec and McAfee have discovered a new Remote Access Trojan (RAT) with strong links to Stuxnet… https://www.virusbulletin.com/blog/2011/10/son-stuxnet-trojan-found/

Attack targets government agencies in CIS countries

Trojans used to steal specific files.
Trojans used to steal specific files. Researchers at Trend Micro have discovered an ongoing targeted attack against, among others, government agencies and diplomatic missions in… https://www.virusbulletin.com/blog/2011/09/attack-targets-government-agencies-cis-countries/

Windows Help Files used in targeted attacks

Files with code-executing properties attached to emails.
Files with code-executing properties attached to emails. Researchers at Symantec have discovered Windows Help Files being used in targeted attacks. Such help files, which use the… https://www.virusbulletin.com/blog/2011/09/windows-help-files-used-targeted-attacks/

Adobe releases emergency update for Flash Player

Zero-day exploit actively being abused.
Zero-day exploit actively being abused.Adobe has announced it will release an update for its Flash Player on Friday 15 April, fixing a vulnerability that is currently being… https://www.virusbulletin.com/blog/2011/04/adobe-releases-emergency-update-flash-player/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.