VB Blog

VB2015 conference programme announced

Posted by   Virus Bulletin on   Mar 31, 2015

From drones to elephants: an exciting range of topics will be covered in Prague.

Read more  

Paper: a timeline of mobile botnets

Posted by   Virus Bulletin on   Mar 30, 2015

Ruchna Nigam provides an overview of more than 60 mobile malware families.

Read more  

Paper: Dylib hijacking on OS X

Posted by   Virus Bulletin on   Mar 19, 2015

Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.

Read more  

Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks

Posted by   Virus Bulletin on   Mar 12, 2015

Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy.

Read more  

Will DIME eventually replace email?

Posted by   Virus Bulletin on   Mar 12, 2015

Protocol has all the advantages of email, yet is orders of magnitude more secure.

Read more  

The ghost of Stuxnet past

Posted by   Virus Bulletin on   Mar 11, 2015

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete.

Read more  

Canadian firm fined $1.1m for breaching anti-spam law

Posted by   Virus Bulletin on   Mar 6, 2015

First success story for long-awaited CASL.

Read more  

Virus Bulletin seeks hackers, network researchers for VB2015

Posted by   Virus Bulletin on   Mar 6, 2015

One week left to submit an abstract for the 25th Virus Bulletin conference.

Read more  

VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps

Posted by   Virus Bulletin on   Mar 5, 2015

Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes that can have unintended consequences.

Read more  

FREAK attack takes HTTPS connections back to 1990s security

Posted by   Virus Bulletin on   Mar 4, 2015

Golden keys from the (first) crypto wars have come back to haunt us.

Read more  

Search blog

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.
Seven years ago, the first VB conference paper on Android malware looked at what was then a new, but growing trend. Since then both the threat and the research community have… https://www.virusbulletin.com/blog/2018/08/vb2018-preview-unpacking-packed-unpacker-reversing-android-anti-analysis-library/

Paper: Not old enough to be forgotten: the new chic of Visual Basic 6

Marion Marschalek looks at two Miuref binaries: one packed with Visual Basic 6 and one with C++.
Marion Marschalek looks at two Miuref binaries: one packed with Visual Basic 6 and one with C++. Two months ago, Microsoft announced it had added 'Miuref' to its Malicious Software… https://www.virusbulletin.com/blog/2014/07/paper-not-old-enough-be-forgotten-new-chic-visual-basic-6/

IEEE announces Anti-Malware Support Service

'Software taggant system' and 'clean file metadata exchange' discussed at previous VB conferences.
'Software taggant system' and 'clean file metadata exchange' discussed at previous VB conferences. Wouldn't it be nice if providers of software packers included a licence key in… https://www.virusbulletin.com/blog/2014/03/ieee-announces-anti-malware-support-service/

Security experts gather in Europe

Anti-malware insights pooled at AMTSO, CARO and EICAR meetings.
Anti-malware insights pooled at AMTSO, CARO and EICAR meetings. Many of the world's leading anti-malware and security experts came together in the past week, at a string of… https://www.virusbulletin.com/blog/2008/05/security-experts-gather-europe/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.