VB Blog

India believed to be source of sophisticated surveillance campaigns

Posted by   Virus Bulletin on   May 21, 2013

In-depth investigations find widespread worldwide snooping, Pakistan primary target.

Read more  

German anti-botnet advisory recommends the use of ad blockers for security

Posted by   Virus Bulletin on   May 17, 2013

'If websites want to include ads, they must make sure they are secure.'

Read more  

Commoditization increasingly seen in mobile malware

Posted by   Virus Bulletin on   May 16, 2013

Number of malicious samples and families increase, as Android remains most popular mobile platform.

Read more  

Microsoft 'found to make requests' to URLs shared via Skype

Posted by   Virus Bulletin on   May 14, 2013

HEAD requests likely used to determine landing page.

Read more  

Program turns anti-analysis tools against the malware

Posted by   Virus Bulletin on   May 14, 2013

Users cautioned to be wary of a false sense of security.

Read more  

Twitter, Facebook accounts used in watering hole campaign

Posted by   Virus Bulletin on   May 13, 2013

USAID sympathizers targeted with links from 'like-minded people'.

Read more  

Microsoft offers fix-it for IE 8 zero-day

Posted by   Virus Bulletin on   May 9, 2013

CVE-2013-1347 used in watering hole attacks.

Read more  

Vulnerabilities could trigger payload in emails upon receiving or opening

Posted by   Virus Bulletin on   May 7, 2013

Flaws in IBM Notes and Exim/Dovecot easy to mitigate.

Read more  

Opposition activists in Asia and Africa targeted by spyware developed by Western companies

Posted by   Virus Bulletin on   May 2, 2013

Mozilla angry about use of its brand and logo.

Read more  

WordPress pingback used for DDoS attacks

Posted by   Virus Bulletin on   May 1, 2013

Millions of sites could potentially be used in attack.

Read more  

Search blog

VB2014 paper: OPSEC for security researchers

Vicente Diaz teaches researchers the basics of OPSEC.
Vicente Diaz teaches researchers the basics of OPSEC.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video… https://www.virusbulletin.com/blog/2015/01/paper-opsec-security-researchers/

WhatsApp spam on the rise

End-to-end encryption makes spam filtering more difficult.
End-to-end encryption makes spam filtering more difficult. Spam sent through the WhatsApp messaging service is on the rise, mobile security firm AdaptiveMobile reports. This news… https://www.virusbulletin.com/blog/2015/01/whatsapp-spam-rise/

What would Cameron's 'anti-terrorism' proposals mean for the UK?

Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism.
Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism. This week, in the aftermath of the terrorist attacks on the French offices of… https://www.virusbulletin.com/blog/2015/01/what-would-cameron-s-anti-terrorism-proposals-mean-uk/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

Microsoft no longer publishes advance notifications for its Patch Tuesdays

Company unhappy with Google going full disclosure on privilege escalation vulnerability.
Company unhappy with Google going full disclosure on privilege escalation vulnerability. Tomorrow is the second Tuesday of the month and, as most people reading this blog will… https://www.virusbulletin.com/blog/2015/01/microsoft-no-longer-publishes-advance-notifications-its-patch-tuesdays/

VB2014 Paper: Attack surface analysis of Tizen devices

Irfan Asrar looks at the security of the operating system used in many IoT devices.
Irfan Asrar looks at the security of the operating system used in many IoT devices.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014… https://www.virusbulletin.com/blog/2015/01/paper-attack-surface-analysis-tizen-devices/

New VB100 and VBSpam test results published

See which anti-malware and anti-spam solutions achieved certification.
See which anti-malware and anti-spam solutions achieved certification. Shortly before the Christmas holidays, we published a new VB100 anti-malware test report as well as a new… https://www.virusbulletin.com/blog/2015/01/new-and-vbspam-test-results-published/

VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.
Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.Since the close of the VB2014 conference in Seattle in October, we… https://www.virusbulletin.com/blog/2015/01/paper-unveiling-kernel-rootkit-discovery-using-selective-automated-kernel-memory-differencing/

Virus Bulletin wishes you a great 2015

See you in Prague - and on the Internet!
See you in Prague - and on the Internet! 2014 was an exciting year for Virus Bulletin: we made all of our content free, ran a successful and well-attended conference in Seattle,… https://www.virusbulletin.com/blog/2015/01/wishes-you-great-2015/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2015/01/

2015

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsCall for Papers: VB2016 DenverVB seeks submissions for the 26th Virus Bulletin Conference. 22 December 2015VB2015 video: Making a dent in Russian mobile banking… https://www.virusbulletin.com/blog/2015/

Conference review: Botconf 2014

Second edition of 'botnet fighting conference' another great success.
Second edition of 'botnet fighting conference' another great success. I had been looking forward to the second edition of the Botconf conference ever since I came back from the… https://www.virusbulletin.com/blog/2014/12/conference-review-botconf-2014/

Call for Papers: VB2015 Prague

VB seeks submissions for the 25th Virus Bulletin Conference.
VB seeks submissions for the 25th Virus Bulletin Conference.Virus Bulletin is seeking submissions from those wishing to present papers at VB2015, which will take place 30 September… https://www.virusbulletin.com/blog/2014/12/call-papers-prague/

Book review: Countdown to Zero Day

Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics.
Kim Zetter's book on Stuxnet is a must-read for anyone interested in malware - or in 21st century geopolitics. There is a tendency among the media to call every hack 'advanced', to… https://www.virusbulletin.com/blog/2014/12/book-review-countdown-zero-day/

Virus Bulletin announces platinum sponsors for VB2015

More sponsorship opportunities available.
More sponsorship opportunities available. While the opening of VB2015 in Prague is still more than nine months away, we have already started with the preparations for what will be… https://www.virusbulletin.com/blog/2014/12/announces-platinum-sponsors/

VB2014 paper: Smart home appliance security and malware

Jeongwook Oh demonstrates how to hack a Samsung smart TV.
Jeongwook Oh demonstrates how to hack a Samsung smart TV.Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations.… https://www.virusbulletin.com/blog/2014/12/paper-smart-home-appliance-security-and-malware/

Virus Bulletin is hiring

VB seeks a Perl Developer / Security Engineer.
VB seeks a Perl Developer / Security Engineer. 2014 has been an exciting year for Virus Bulletin: we went through some personnel changes, made all of our content freely available,… https://www.virusbulletin.com/blog/2014/12/hiring/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2014/12/

Conference report: VB2014

The biggest and broadest ranging Virus Bulletin conference ever was a great success.
The biggest and broadest ranging Virus Bulletin conference ever was a great success. There is a Dutch expression that says that you shouldn't trust a butcher who judges his own… https://www.virusbulletin.com/blog/2014/11/conference-report/

VB2014 paper: Labelling spam through the analysis of protocol patterns

What do your IP packet sizes say about whether you're a spammer?
What do your IP packet sizes say about whether you're a spammer?Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the… https://www.virusbulletin.com/blog/2014/11/paper-labelling-spam-through-analysis-protocol-patterns/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.