VB Blog

VB2016 paper: Debugging and monitoring malware network activities with Haka

Posted by   Martijn Grooten on   Apr 24, 2017

In their VB2016 paper, Stormshield researchers Benoît Ancel and Mehdi Talbi introduced Haka, an open-source language to monitor, debug and control malicious network traffic. Both their paper and the video recording of their presentation are now available to read/view on www.virusbulletin.com.

Read more  

VB2017: a wide ranging and international conference programme

Posted by   Martijn Grooten on   Apr 13, 2017

We are proud to announce a very broad and very international programme for VB2017, which will take place in Madrid, 4-6 October 2017.

Read more  

John Graham-Cumming and Brian Honan to deliver keynote addresses at VB2017

Posted by   Martijn Grooten on   Apr 10, 2017

Virus Bulletin is excited to announce John-Graham Cumming and Brian Honan as the two keynote speakers for VB2017 in Madrid.

Read more  

Virus Bulletin says a fond farewell to John Hawes

Posted by   Martijn Grooten on   Mar 31, 2017

As VB's COO John Hawes moves on to new challenges, the team wish him a fond farewell and good luck in his future endeavours.

Read more  

VB2016 paper: One-Click Fileless Infection

Posted by   Martijn Grooten on   Mar 28, 2017

Symantec researchers Himanshu Anand and Chastine Menrige explain how a single click can lead to a compromised machine, without malware ever being stored on disk.

Read more  

Mostly blocked, but still good enough: Necurs sending pump-and-dump spam

Posted by   Martijn Grooten on   Mar 22, 2017

The Necurs botnet has started sending pump-and-dump spam. Almost all of these emails are blocked by spam filters, yet the stock price still increased.

Read more  

Why the SHA-1 collision means you should stop using the algorithm

Posted by   Martijn Grooten on   Mar 10, 2017

Realistically speaking, if your software or system uses the SHA-1 hashing algorithm, it is unlikely that it will be exploited in the foreseeable future. But it is also extremely difficult to be certain that your system won't be the exception.

Read more  

VB2017 Call for Papers: frequently asked questions

Posted by   Martijn Grooten on   Mar 10, 2017

The call for papers for VB2017, which takes place 4 to 6 October in Madrid, Spain, is currently open. We're always on the look out for new speakers and new content, so to help anyone who's unfamiliar with the VB conference, we've prepared a list of answers to some frequently asked questions about the event, and about how to submit a paper.

Read more  

Throwback Thursday: Michelangelo - Graffiti Not Art

Posted by   Helen Martin on   Mar 9, 2017

This week marked the 25th anniversary of the trigger date of the infamous Michelangelo virus. In January 1992, VB published an analysis of the boot sector virus that captured the imagination of the press and kicked up a media storm.

Read more  

How are you defending your network? Come and tell us at VB2017!

Posted by   Martijn Grooten on   Mar 8, 2017

Is it your job to defend your company’s network? Are you defending a government’s systems? Do you help secure the devices used by activists operating in less open societies? Do you work with abuse victims targeted by spyware? Share your experiences with the security community at VB2017.

Read more  

Search blog

Hundreds of APTs linked to Chinese Army department

'Unit 61398' employs hundreds of people.
'Unit 61398' employs hundreds of people. A new report by security firm Mandiant links a large number of cyber-espionage cases to a department of the Chinese army. The report is… https://www.virusbulletin.com/blog/2013/02/hundreds-apts-linked-chinese-army-department/

Massive drop in PPI SMS spam after spammers fined

Levels still higher than for most of 2012.
Levels still higher than for most of 2012. Security firm Cloudmark has reported a significant drop in the amount of PPI (Payment Protection Insurance) spam sent via SMS in the UK… https://www.virusbulletin.com/blog/2013/02/massive-drop-ppi-sms-spam-after-spammers-fined/

EU to propose cybersecurity rules

Companies required to report breaches.
Companies required to report breaches. The European Union is due to set out a new set of cybersecurity rules tomorrow - in which companies including search engines, energy… https://www.virusbulletin.com/blog/2013/02/eu-propose-cybersecurity-rules/

Drop reported in infected computers worldwide

Nearly one third of computers still found to be infected.
Nearly one third of computers still found to be infected. The proportion of infected computers worldwide decreased from 38.49% in 2011 to 31.98% last year, according to an annual… https://www.virusbulletin.com/blog/2013/02/drop-reported-infected-computers-worldwide/

Happy Safer Internet Day

10th annual awareness day focuses on rights and responsibilities.
10th annual awareness day focuses on rights and responsibilities. Today (5th February) is Safer Internet Day 2013 across the world. Safer Internet Day (SID) is organised by the… https://www.virusbulletin.com/blog/2013/02/happy-safer-internet-day/

Impressive results in latest VBSpam test

Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate.
Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate. No fewer than ten anti-spam solutions… https://www.virusbulletin.com/blog/2013/02/impressive-results-latest-vbspam-test/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
The February issue of Virus Bulletin is now available for subscribers to download. The February 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/02/february-issue-vb-published/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/02/

Phone support scammers attempt repeat business

Previous victims contacted again and tricked into 'renewing' service.
Previous victims contacted again and tricked into 'renewing' service. Phone support scammers have found a new way to make easy money: by calling back people whom they have… https://www.virusbulletin.com/blog/2013/01/phone-support-scammers-attempt-repeat-business/

Avast launches bug bounty programme

Security firm offers reward for info on bugs.
Security firm offers reward for info on bugs. Security firm Avast Software, producer of the popular avast! free anti-virus solution, has announced a bug bounty programme to… https://www.virusbulletin.com/blog/2013/01/avast-launches-bug-bounty-programme/

VB2014 - location, location, location

Cat escapes bag as details of VB2014 conference are announced.
Cat escapes bag as details of VB2014 conference are announced. Keeping shtum about the dates and details for VB2014 - the 24th Virus Bulletin International Conference - has not… https://www.virusbulletin.com/blog/2013/01/location-location-location/

Indian government proposes pamphlet-based cybersecurity education

Mandatory brochures not welcomed by manufacturers.
Mandatory brochures not welcomed by manufacturers. In an attempt to raise public awareness of security issues, the Indian government has proposed a plan in which it will be… https://www.virusbulletin.com/blog/2013/01/indian-government-proposes-pamphlet-based-cybersecurity-education/

Anonymous petitions Obama Administration

Anti-virus and security related articles provided by independent anti-virus advisors, Virus Bulletin
"Make DDoS a legal form of protest." Hacking/protest group Anonymous has petitioned the Obama Administration to recognize DDoS attacks as a legal form of protest. The petition… https://www.virusbulletin.com/blog/2013/01/anonymous-petitions-obama-administration/

Cat carries computer virus

Cat collared.
Cat collared. Japanese police have captured a cat said to be carrying a computer virus on a memory card attached to its collar. The bizarre 'arrest' came after various Japanese… https://www.virusbulletin.com/blog/2013/01/cat-carries-computer-virus/

European Cybercrime Centre set for launch

Central cybercrime resource for EU member states.
Central cybercrime resource for EU member states. This Friday will see the doors of the new European Cybercrime Centre (EC3) officially open in The Hague. The EC3 - which will be… https://www.virusbulletin.com/blog/2013/01/european-cybercrime-centre-set-launch/

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/01/january-issue-vb-published/

2013

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsBotconf - the 'first botnet fighting conference'Tools, ideas and research presented in Nantes. 10 December 2013VB2014: more of the same, plus something a little… https://www.virusbulletin.com/blog/2013/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/01/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/12/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/12/december-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.