VB Blog

CSRF vulnerability in USB modems allows for infrastructure-less phishing

Posted by   Virus Bulletin on   Jan 29, 2014

Credentials sent to attacker by built-in SMS functionality.

Read more  

Browser-based ransomware uses scare tactics to extort money

Posted by   Virus Bulletin on   Jan 24, 2014

Unsophisticated scam shows the high level of commoditization of today's cybercrime.

Read more  

Is your fridge sending spam?

Posted by   Virus Bulletin on   Jan 21, 2014

It's possible that smart devices are sending spam, but it wouldn't make any difference.

Read more  

January issue of VB published

Posted by   Virus Bulletin on   Jan 1, 2014

The January issue of Virus Bulletin is now available for subscribers to download.

Read more  

Botconf - the 'first botnet fighting conference'

Posted by   Virus Bulletin on   Dec 10, 2013

Tools, ideas and research presented in Nantes.

Read more  

VB2014: more of the same, plus something a little different

Posted by   Virus Bulletin on   Dec 9, 2013

Hackers, network security researchers encouraged to submit abstracts for the conference.

Read more  

December issue of VB published

Posted by   Virus Bulletin on   Dec 1, 2013

The December issue of Virus Bulletin is now available for subscribers to download.

Read more  

Spamhaus CIO calls for those running open DNS resolvers to be fined

Posted by   Virus Bulletin on   Nov 29, 2013

Open DNS resolvers instrumental in many DDoS attacks.

Read more  

Privilege escalation vulnerability targets Windows XP and Server 2003

Posted by   Virus Bulletin on   Nov 28, 2013

Vulnerability being used in the wild in combination with exploit of patched Adobe Reader vulnerability.

Read more  

There is a place for unauthenticated key exchange, but don't tell anyone

Posted by   Virus Bulletin on   Nov 21, 2013

Making dragnet surveillance harder justifies using weak form of encryption.

Read more  

Search blog

Malware and phishing cost US users $7 billion in two years

Survey finds 1 in 4 risk of being hit by viruses, spyware and scams.
Survey finds 1 in 4 risk of being hit by viruses, spyware and scams. US consumer watchdog Consumer Reports has unveiled its annual 'State of the Net' study, showing serious numbers… https://www.virusbulletin.com/blog/2007/08/malware-and-phishing-cost-us-users-7-billion-two-years/

Battle over Blackberry spyware threat

Spy tool for popular device claims to be legitimate.
Spy tool for popular device claims to be legitimate. The expansion of the FlexiSpy mobile device snooping software, originally available only for the Symbian platform but with… https://www.virusbulletin.com/blog/2007/07/battle-over-blackberry-spyware-threat/

Amero case sent for retrial

Spyware popup teacher told earlier trial was flawed.
Spyware popup teacher told earlier trial was flawed. Connecticut temporary teaching assistant Julie Amero, convicted of exposing minors to danger when a classroom computer she had… https://www.virusbulletin.com/blog/2007/06/amero-case-sent-retrial/

Google stashing adware on Dell systems, says OpenDNS founder

Toolbar partnership accused of devious spyware tactics.
Toolbar partnership accused of devious spyware tactics. The partnership between search giant Google and hardware behemoth Dell, which has led to the popular Google Toolbar being… https://www.virusbulletin.com/blog/2007/05/google-stashing-adware-dell-systems-says-opendns-founder/

Zango sues PC Tools for $35 million

'Reformed' adware shippers upset by detection and removal.
'Reformed' adware shippers upset by detection and removal. Adware and sometime spyware maker Zango has brought a suit against anti-spyware firm PC Tools complaining that the… https://www.virusbulletin.com/blog/2007/05/zango-sues-pc-tools-35-million/

I-SPY chases SPY-ACT through approval process

Second piece of US anti-spyware legislation given go-ahead.
Second piece of US anti-spyware legislation given go-ahead. With the 'Securely Protect Yourself Against Cyber Trespass Act' (aka SPY-ACT act) approved by a House of Representatives… https://www.virusbulletin.com/blog/2007/05/i-spy-chases-spy-act-through-approval-process/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.