VB Blog

Virus Bulletin announces programme of the first International Threat Intelligence Summit

Posted by   Martijn Grooten on   Aug 29, 2018

VB is thrilled to announce the programme of the first International Threat Intelligence Summit that will form an integral part of the VB2018 conference programme.

Read more  

VB2018 preview: Explain Ethereum smart contract hacking like I am five

Posted by   Martijn Grooten on   Aug 28, 2018

Designing smart contracts is hard: we preview a VB2018 paper on the blockchain-based platform Ethereum, that describes both how the technology works and how a number of security issues inherent to the platform have led to various high-profile and often very costly hacks.

Read more  

VB2017 video: Client Maximus raises the bar

Posted by   Martijn Grooten on   Aug 27, 2018

At VB2017, IBM Trusteer researcher Omer Agmon, presented a 'last-minute' paper in which he analysed the Client Maximum trojan, which targets Brazilian users of online banking. Today, we release the recording of his presentation.

Read more  

The security industry is genuinely willing to help you do good work

Posted by   Martijn Grooten on   Aug 21, 2018

For those organizations working for the public good, security vendors are often willing to offer their services for free, or for very low cost.

Read more  

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

Posted by   Martijn Grooten on   Aug 17, 2018

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

Read more  

VB2018 preview: From drive-by download to drive-by mining

Posted by   Martijn Grooten on   Aug 15, 2018

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Read more  

Red Eyes threat group targets North Korean defectors

Posted by   Martijn Grooten on   Aug 14, 2018

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on North Korea.

Read more  

VB announces Threat Intelligence Summit to take place during VB2018

Posted by   Martijn Grooten on   Aug 9, 2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

Read more  

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

Posted by   Martijn Grooten on   Aug 7, 2018

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

Read more  

VB2018 call for last-minute papers opened

Posted by   Martijn Grooten on   Jul 27, 2018

The call for last-minute papers for VB2018 is now open. Submit before 2 September to have your abstract considered for one of the nine slots reserved for 'hot' research.

Read more  

Search blog

Latest VBSpam certification results published

Latest VBSpam results published - full report now also available.
Latest VBSpam results published - full report now also available. The results of the September VBSpam comparative review have been announced. This month's VBSpam test sees 23… https://www.virusbulletin.com/blog/2011/09/latest-vbspam-certification-results-published/

Windows Help Files used in targeted attacks

Files with code-executing properties attached to emails.
Files with code-executing properties attached to emails. Researchers at Symantec have discovered Windows Help Files being used in targeted attacks. Such help files, which use the… https://www.virusbulletin.com/blog/2011/09/windows-help-files-used-targeted-attacks/

Iranians spied on using rogue DigiNotar certificates

Fake certificates signed for CIA, Mossad, Google, Facebook.
Fake certificates signed for CIA, Mossad, Google, Facebook. It is likely that Iranian Internet users have been spied on following a hack discovered at Dutch certificate authority… https://www.virusbulletin.com/blog/2011/09/iranians-spied-using-rogue-diginotar-certificates/

September issue of VB published

The September issue of Virus Bulletin is now available for subscribers to download.
The September issue of Virus Bulletin is now available for subscribers to download. The September 2011 issue of Virus Bulletin is now available for subscribers to browse online… https://www.virusbulletin.com/blog/2011/09/september-issue-vb-published/

September

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/09/

Researchers find email used in RSA hack

Email with malicious attachment uploaded to online scanning service
Email with malicious attachment uploaded to online scanning service Researchers at F-Secure have managed to obtain the file used in the targeted attack against security vendor RSA… https://www.virusbulletin.com/blog/2011/08/researchers-find-email-used-rsa-hack/

Explosive growth of malicious spam

Spam filters less likely to block current malware campaigns.
Spam filters less likely to block current malware campaigns. While several reports show that the global levels of spam have seen a steady decline over the past year, this month has… https://www.virusbulletin.com/blog/2011/08/explosive-growth-malicious-spam/

Spam sent via fake out-of-office messages

'Sick leave' message followed by weight loss spam.
'Sick leave' message followed by weight loss spam. In an apparently new way of spreading their messages, spammers are advertising their products via fake out-of-office replies.… https://www.virusbulletin.com/blog/2011/08/spam-sent-fake-out-office-messages/

Fake codec trojan disables anti-virus software

Victim tricked into believing security software still active.
Victim tricked into believing security software still active. A new trojan, discovered by researchers at ESET, spreads itself via fake codecs, then disables running anti-virus… https://www.virusbulletin.com/blog/2011/08/fake-codec-trojan-disables-anti-virus-software/

Banking malware tells user to 'refund' money

Web injection used to suggest accidental transfer.
Web injection used to suggest accidental transfer. In a new twist to banking trojans, a piece of malware found on German computers tricks victims into believing a large amount has… https://www.virusbulletin.com/blog/2011/08/banking-malware-tells-user-refund-money/

August issue of VB published

The August issue of Virus Bulletin is now available for subscribers to download.
The August issue of Virus Bulletin is now available for subscribers to download. The August 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/08/august-issue-vb-published/

August

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/08/

AV-Test.org unveils latest certifications

Q2 test results covering 22 products released.
Q2 test results covering 22 products released. Independent testing body AV-Test.org has released the results of its latest round of testing, putting 22 of the latest security… https://www.virusbulletin.com/blog/2011/07/av-test-org-unveils-latest-certifications/

Rogue Twitter application steals passwords

'See who stalks my Twitter' used to lure users.
'See who stalks my Twitter' used to lure users. A malicious Twitter application is currently spreading on the microblogging network, luring users to hand over their passwords,… https://www.virusbulletin.com/blog/2011/07/rogue-twitter-application-steals-passwords/

Hotmail beefs up security with stricter password policy

'My friend has been spammed' button also welcomed by experts.
'My friend has been spammed' button also welcomed by experts.Microsoft's free webmail service Hotmail has introduced some new features which should make it less likely for its… https://www.virusbulletin.com/blog/2011/07/hotmail-beefs-security-stricter-password-policy/

Trojan uses remote user account to control compromised machine

Malware targets customers of Brazilian banks.
Malware targets customers of Brazilian banks. Researchers at Kaspersky have discovered a piece of malware aimed at customers of Brazilian banks which creates a remote user account… https://www.virusbulletin.com/blog/2011/07/trojan-uses-remote-user-account-control-compromised-machine/

Latest VBSpam certification results published

Latest VBSpam results published - full report now also available.
Latest VBSpam results published - full report now also available. The results of the July VBSpam comparative review have been announced. The 14th VBSpam test showed both a number… https://www.virusbulletin.com/blog/2011/07/latest-vbspam-certification-results-published/

Zitmo trojan for Android defeats two-factor authentication

Malware intercepts TANs sent via SMS.
Malware intercepts TANs sent via SMS. A new variant of the Zitmo trojan has been discovered that infects mobile devices running the Android platform and which intercepts SMS… https://www.virusbulletin.com/blog/2011/07/zitmo-trojan-android-defeats-two-factor-authentication/

Google delists all .co.cc domains from its index

Large fraction of sites deemed 'spammy or low-quality'.
Large fraction of sites deemed 'spammy or low-quality'.Google has removed all sites running on subdomains of .co.cc from its search engine index as the company believes too large a… https://www.virusbulletin.com/blog/2011/07/google-delists-all-co-cc-domains-its-index/

July issue of VB published

The July issue of Virus Bulletin is now available for subscribers to download.
The July issue of Virus Bulletin is now available for subscribers to download. The July 2011 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2011/07/july-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.