VB Blog

Paper: Beta exploit pack: one more piece of crimeware for the infection road!

Posted by   Virus Bulletin on   Jun 19, 2015

Exploit kit currently being tested focuses primarily on Flash Player exploits.

Read more  

Throwback Thursday: Macro Viruses & The Little Virus That Could...

Posted by   Virus Bulletin on   Jun 18, 2015

This Throwback Thursday, we turn the clock back to 1999, when Melissa was causing havoc across the globe and VB presented a series of articles detailing all you ever wanted to know about macro viruses but were afraid to ask.

Read more  

Virus Bulletin announces 'Small Talks' for VB2015

Posted by   Virus Bulletin on   Jun 17, 2015

Smaller, more informal format ideal for discussion and debate.

Read more  

Throwback Thursday: Virus Writers

Posted by   Virus Bulletin on   Jun 11, 2015

This Throwback Thursday, we bring you a series of articles from the archives that looked at virus writers, asking 'who are they?', 'why do they do it?', and other pertinent questions.

Read more  

Vawtrak uses Tor2Web to connect to Tor hidden C&C servers

Posted by   Virus Bulletin on   Jun 11, 2015

Option hides the servers, without having to include a Tor client in the malware.

Read more  

Duqu 2.0 found to target security company

Posted by   Virus Bulletin on   Jun 10, 2015

Advanced malware also targeted venues linked to Iranian nuclear negotiations.

Read more  

London calling!

Posted by   Virus Bulletin on   May 27, 2015

Infosecurity Europe, BSides London and the Security Bloggers Meetup.

Read more  

Paper: On the beat

Posted by   Virus Bulletin on   May 22, 2015

Kevin Williams looks back at UK law enforcement successes at combating cybercrime.

Read more  

Throwback Thursday: Research and Other Hobbies

Posted by   Virus Bulletin on   May 21, 2015

This Throwback Thursday we reflect on the life of one of industry's greats, who sadly passed away this week: Prof. Klaus Brunnstein.

Read more  

Weak keys and prime reuse make Diffie-Hellman implementations vulnerable

Posted by   Virus Bulletin on   May 20, 2015

'Logjam' attack possibly used by the NSA to decrypt VPN traffic.

Read more  

Search blog

Malware and phishing cost US users $7 billion in two years

Survey finds 1 in 4 risk of being hit by viruses, spyware and scams.
Survey finds 1 in 4 risk of being hit by viruses, spyware and scams. US consumer watchdog Consumer Reports has unveiled its annual 'State of the Net' study, showing serious numbers… https://www.virusbulletin.com/blog/2007/08/malware-and-phishing-cost-us-users-7-billion-two-years/

Battle over Blackberry spyware threat

Spy tool for popular device claims to be legitimate.
Spy tool for popular device claims to be legitimate. The expansion of the FlexiSpy mobile device snooping software, originally available only for the Symbian platform but with… https://www.virusbulletin.com/blog/2007/07/battle-over-blackberry-spyware-threat/

Amero case sent for retrial

Spyware popup teacher told earlier trial was flawed.
Spyware popup teacher told earlier trial was flawed. Connecticut temporary teaching assistant Julie Amero, convicted of exposing minors to danger when a classroom computer she had… https://www.virusbulletin.com/blog/2007/06/amero-case-sent-retrial/

Google stashing adware on Dell systems, says OpenDNS founder

Toolbar partnership accused of devious spyware tactics.
Toolbar partnership accused of devious spyware tactics. The partnership between search giant Google and hardware behemoth Dell, which has led to the popular Google Toolbar being… https://www.virusbulletin.com/blog/2007/05/google-stashing-adware-dell-systems-says-opendns-founder/

Zango sues PC Tools for $35 million

'Reformed' adware shippers upset by detection and removal.
'Reformed' adware shippers upset by detection and removal. Adware and sometime spyware maker Zango has brought a suit against anti-spyware firm PC Tools complaining that the… https://www.virusbulletin.com/blog/2007/05/zango-sues-pc-tools-35-million/

I-SPY chases SPY-ACT through approval process

Second piece of US anti-spyware legislation given go-ahead.
Second piece of US anti-spyware legislation given go-ahead. With the 'Securely Protect Yourself Against Cyber Trespass Act' (aka SPY-ACT act) approved by a House of Representatives… https://www.virusbulletin.com/blog/2007/05/i-spy-chases-spy-act-through-approval-process/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.