VB Blog

VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

Posted by   Martijn Grooten on   Sep 12, 2016

In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi Talbi will present a paper on Haka, a tool that can be used to monitor and debug malware's network communications.

Read more  

Paper: Behavioural Detection and Prevention of Malware on OS X

Posted by   Martijn Grooten on   Sep 12, 2016

In a new paper published through Virus Bulletin, Vincent Van Mieghem presents a novel method for detecting malware on Mac OS X, based on the system calls used by malicious software.

Read more  

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Search blog

March issue of VB published

The March issue of Virus Bulletin is now available for subscribers to download.
The March issue of Virus Bulletin is now available for subscribers to download. The March 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/03/march-issue-vb-published/

VB data supports Google's claim to having reduced compromised accounts

Internet giant may indeed do something right; Yahoo! has a real problem.
Internet giant may indeed do something right; Yahoo! has a real problem. Internet giant Google claims that a 'complex risk analysis' using 'more than 120 variables' has reduced the… https://www.virusbulletin.com/blog/2013/02/vb-data-supports-google-s-claim-having-reduced-compromised-accounts/

Hundreds of APTs linked to Chinese Army department

'Unit 61398' employs hundreds of people.
'Unit 61398' employs hundreds of people. A new report by security firm Mandiant links a large number of cyber-espionage cases to a department of the Chinese army. The report is… https://www.virusbulletin.com/blog/2013/02/hundreds-apts-linked-chinese-army-department/

Massive drop in PPI SMS spam after spammers fined

Levels still higher than for most of 2012.
Levels still higher than for most of 2012. Security firm Cloudmark has reported a significant drop in the amount of PPI (Payment Protection Insurance) spam sent via SMS in the UK… https://www.virusbulletin.com/blog/2013/02/massive-drop-ppi-sms-spam-after-spammers-fined/

EU to propose cybersecurity rules

Companies required to report breaches.
Companies required to report breaches. The European Union is due to set out a new set of cybersecurity rules tomorrow - in which companies including search engines, energy… https://www.virusbulletin.com/blog/2013/02/eu-propose-cybersecurity-rules/

Drop reported in infected computers worldwide

Nearly one third of computers still found to be infected.
Nearly one third of computers still found to be infected. The proportion of infected computers worldwide decreased from 38.49% in 2011 to 31.98% last year, according to an annual… https://www.virusbulletin.com/blog/2013/02/drop-reported-infected-computers-worldwide/

Happy Safer Internet Day

10th annual awareness day focuses on rights and responsibilities.
10th annual awareness day focuses on rights and responsibilities. Today (5th February) is Safer Internet Day 2013 across the world. Safer Internet Day (SID) is organised by the… https://www.virusbulletin.com/blog/2013/02/happy-safer-internet-day/

Impressive results in latest VBSpam test

Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate.
Excellent performances in spam filter test - plus evidence of a correlation between spam 'passing' SPF and an increased delivery rate. No fewer than ten anti-spam solutions… https://www.virusbulletin.com/blog/2013/02/impressive-results-latest-vbspam-test/

February

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/02/

February issue of VB published

The February issue of Virus Bulletin is now available for subscribers to download.
The February issue of Virus Bulletin is now available for subscribers to download. The February 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/02/february-issue-vb-published/

Phone support scammers attempt repeat business

Previous victims contacted again and tricked into 'renewing' service.
Previous victims contacted again and tricked into 'renewing' service. Phone support scammers have found a new way to make easy money: by calling back people whom they have… https://www.virusbulletin.com/blog/2013/01/phone-support-scammers-attempt-repeat-business/

Avast launches bug bounty programme

Security firm offers reward for info on bugs.
Security firm offers reward for info on bugs. Security firm Avast Software, producer of the popular avast! free anti-virus solution, has announced a bug bounty programme to… https://www.virusbulletin.com/blog/2013/01/avast-launches-bug-bounty-programme/

VB2014 - location, location, location

Cat escapes bag as details of VB2014 conference are announced.
Cat escapes bag as details of VB2014 conference are announced. Keeping shtum about the dates and details for VB2014 - the 24th Virus Bulletin International Conference - has not… https://www.virusbulletin.com/blog/2013/01/location-location-location/

Indian government proposes pamphlet-based cybersecurity education

Mandatory brochures not welcomed by manufacturers.
Mandatory brochures not welcomed by manufacturers. In an attempt to raise public awareness of security issues, the Indian government has proposed a plan in which it will be… https://www.virusbulletin.com/blog/2013/01/indian-government-proposes-pamphlet-based-cybersecurity-education/

Anonymous petitions Obama Administration

Anti-virus and security related articles provided by independent anti-virus advisors, Virus Bulletin
"Make DDoS a legal form of protest." Hacking/protest group Anonymous has petitioned the Obama Administration to recognize DDoS attacks as a legal form of protest. The petition… https://www.virusbulletin.com/blog/2013/01/anonymous-petitions-obama-administration/

European Cybercrime Centre set for launch

Central cybercrime resource for EU member states.
Central cybercrime resource for EU member states. This Friday will see the doors of the new European Cybercrime Centre (EC3) officially open in The Hague. The EC3 - which will be… https://www.virusbulletin.com/blog/2013/01/european-cybercrime-centre-set-launch/

Cat carries computer virus

Cat collared.
Cat collared. Japanese police have captured a cat said to be carrying a computer virus on a memory card attached to its collar. The bizarre 'arrest' came after various Japanese… https://www.virusbulletin.com/blog/2013/01/cat-carries-computer-virus/

2013

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsBotconf - the 'first botnet fighting conference'Tools, ideas and research presented in Nantes. 10 December 2013VB2014: more of the same, plus something a little… https://www.virusbulletin.com/blog/2013/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2013/01/

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2013 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2013/01/january-issue-vb-published/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.