VB Blog

Researchers demonstrate how IPv6 can easily be used to perform MitM attacks

Posted by   Virus Bulletin on   Aug 12, 2013

Many devices simply waiting for router advertisements, good or evil.

Read more  

VB2013 speaker spotlight

Posted by   Virus Bulletin on   Aug 9, 2013

We speak to VB2013 presenters Ilya Rabinovich and Randy Abrams about their research, Windows 8 security, and what they aim to bring to VB2013.

Read more  

ATM manufacturer pays respects to hacker who broke into its systems

Posted by   Virus Bulletin on   Aug 9, 2013

Both Barnaby Jack and Triton showed how white-hat hacking should be done.

Read more  

Are Gmail's new advertisements in breach of CAN-SPAM?

Posted by   Virus Bulletin on   Aug 8, 2013

Marketers upset about 'emails' that you can't unsubscribe from.

Read more  

Thousands of websites affected by nameserver hijack redirecting visitors to malware

Posted by   Virus Bulletin on   Aug 6, 2013

DNS caching causes attack to have a long tail.

Read more  

Firefox 17 zero-day exploit targets users of Tor network

Posted by   Virus Bulletin on   Aug 5, 2013

Visitors to child abuse websites likely target of operation, but will there be collateral damage?

Read more  

There is no 'I know what I am doing' trump card in security

Posted by   Virus Bulletin on   Aug 2, 2013

NSA activities could make millions avoid US-based services.

Read more  

VB2013 speaker spotlight

Posted by   Virus Bulletin on   Aug 2, 2013

We speak to VB2013 presenters Mark Kennedy and Igor Muttik about their research interests and what they aim to bring to VB2013.

Read more  

August issue of VB published

Posted by   Virus Bulletin on   Aug 1, 2013

The August issue of Virus Bulletin is now available for subscribers to download.

Read more  

VB2013 speaker spotlight

Posted by   Virus Bulletin on   Jul 26, 2013

We speak to VB2013 presenters Axelle Apvrille and Karine de Pontevès about their research interests and what they aim to bring to VB2013.

Read more  

Search blog

Trojans and worms hiding behind games

Mario latest lure to hook victims on malware.
Mario latest lure to hook victims on malware. Social engineering techniques used to trick computer users into running malicious code on their systems concentrate around simple… https://www.virusbulletin.com/blog/2007/08/trojans-and-worms-hiding-behind-games/

New OpenOffice proof-of-concept widely noted

Odd payload, not spreading danger, brings attention to cross-platform worm.
Odd payload, not spreading danger, brings attention to cross-platform worm. A new proof-of-concept malware exploiting the OpenOffice document format has made headlines across the… https://www.virusbulletin.com/blog/2007/05/new-openoffice-proof-concept-widely-noted/

Phishing moves into more new areas

Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers.
Surveys, phone lines, USB sticks and call girls the latest tactics for spammers and phishers. The latest social-engineering methods being put to use by phishers show no let up in… https://www.virusbulletin.com/blog/2007/05/phishing-moves-more-new-areas/

« Previous 12 Next »

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.