VB Blog

VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

Posted by   Martijn Grooten on   Sep 12, 2016

In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi Talbi will present a paper on Haka, a tool that can be used to monitor and debug malware's network communications.

Read more  

Paper: Behavioural Detection and Prevention of Malware on OS X

Posted by   Martijn Grooten on   Sep 12, 2016

In a new paper published through Virus Bulletin, Vincent Van Mieghem presents a novel method for detecting malware on Mac OS X, based on the system calls used by malicious software.

Read more  

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Search blog

AV-Test releases latest results

Business and consumer products achieve high pass rate.
Business and consumer products achieve high pass rate. Independent testing lab AV-Test.org has released its latest batch of test results, with 23 consumer products and eight… https://www.virusbulletin.com/blog/2012/01/av-test-releases-latest-results/

Sykipot trojan used to target smart cards

Defence companies among small number of targets.
Defence companies among small number of targets. Researchers at Alienvault have discovered a version of the 'Sykipot' trojan that is being used to target organisations that make… https://www.virusbulletin.com/blog/2012/01/sykipot-trojan-used-target-smart-cards/

Spammers link to site containing QR code

Curious users may scan URL and end up on pharma websites.
Curious users may scan URL and end up on pharma websites. Researchers at Websense have discovered spam containing links to a site containing a QR code in which the spam's target… https://www.virusbulletin.com/blog/2012/01/spammers-link-site-containing-qr-code/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2012/01/

January issue of VB published

The January issue of Virus Bulletin is now available for subscribers to download.
The January issue of Virus Bulletin is now available for subscribers to download. The January 2012 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2012/01/january-issue-vb-published/

2012

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsDecember issue of VB published The December issue of Virus Bulletin is now available for subscribers to download. 03 December 2012Virus Bulletin announces VBWeb tests for web… https://www.virusbulletin.com/blog/2012/

Spammers using Google open redirect

Vulnerability 'not worthy of bug bounty program'.
Vulnerability 'not worthy of bug bounty program'. Researchers at Solera Labs have discovered spammers using an open redirect at Google to hide the final destination of their link… https://www.virusbulletin.com/blog/2011/12/spammers-using-google-open-redirect/

Compromised websites used to mine bitcoins

In-the-browser botnet turns victims' CPU cycles into cash for the attackers.
In-the-browser botnet turns victims' CPU cycles into cash for the attackers. Researchers have discovered a compromised website where a piece of JavaScript has been included that is… https://www.virusbulletin.com/blog/2011/12/compromised-websites-used-mine-bitcoins/

'Nitro attacks' continue

PoisonIvy trojan sent attached to email warning about the same trojan.
PoisonIvy trojan sent attached to email warning about the same trojan. Researchers at Symantec report that the 'Nitro attacks', which target a number of large companies, many of… https://www.virusbulletin.com/blog/2011/12/nitro-attacks-continue/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/12/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2011 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2011/12/december-issue-vb-published/

Recently discovered Java vulnerability being added to exploit kit

Kit 'patched' to include latest exploit; users urged to patch their software too.
Kit 'patched' to include latest exploit; users urged to patch their software too. Security researcher and journalist Brian Krebs has found evidence that a recently discovered… https://www.virusbulletin.com/blog/2011/11/recently-discovered-java-vulnerability-being-added-exploit-kit/

SMS trojan targets Android users in eight western countries

Will another piece of mobile malware convince Google manager of the seriousness of the threat?
Will another piece of mobile malware convince Google manager of the seriousness of the threat? Researchers at Kaspersky have discovered an SMS trojan for Android phones that… https://www.virusbulletin.com/blog/2011/11/sms-trojan-targets-android-users-eight-western-countries/

Latest VBSpam certification results published

Latest VBSpam results published - full report now also available.
Latest VBSpam results published - full report now also available. The results of the November VBSpam comparative review have been announced, with more distinction showing between… https://www.virusbulletin.com/blog/2011/11/latest-vbspam-certification-results-published/

IETF expedites publication of RFC describing feedback loop recommendations

Document fast-tracked to be published shortly before the sad passing of its author J.D. Falk.
Document fast-tracked to be published shortly before the sad passing of its author J.D. Falk. The Internet Engineering Task Force (IETF) has published an RFC detailing current… https://www.virusbulletin.com/blog/2011/11/ietf-expedites-publication-rfc-describing-feedback-loop-recommendations/

South Korea to ask ISPs to block port 25 traffic

Experts sceptical about long-term effects on spam levels.
Experts sceptical about long-term effects on spam levels. South Korea intends to require ISPs to block all outbound traffic on port 25 from anything but the "official" mail… https://www.virusbulletin.com/blog/2011/11/south-korea-ask-isps-block-port-25-traffic/

Most free Android anti-virus 'useless', find testers

AV-Test comparative sees minimal value in free mobile protection.
AV-Test comparative sees minimal value in free mobile protection. In a comparative test run by independent anti-malware testing specialist AV-Test.org, the majority of free Android… https://www.virusbulletin.com/blog/2011/11/most-free-android-anti-virus-useless-find-testers/

Significant rise in Chinese phishing sites

Phishers shown to care little about domain names.
Phishers shown to care little about domain names. In its latest 'Global Phishing Survey', the Anti-Phishing Working Group (APWG) reports a significant increase in phishing sites… https://www.virusbulletin.com/blog/2011/11/significant-rise-chinese-phishing-sites/

'Largest takedown ever' sees six arrested

Millions made through 'DNSChanger' malware.
Millions made through 'DNSChanger' malware. Six Estonian nationals have been arrested for taking part in a cybercrime ring that made money through DNS-changing malware that had… https://www.virusbulletin.com/blog/2011/11/largest-takedown-ever-sees-six-arrested/

Support scammers up their game

Websites and Facebook accounts created to make callers appear more legitimate.
Websites and Facebook accounts created to make callers appear more legitimate. 'Support call scammers' have started to use professional-looking websites and social media accounts… https://www.virusbulletin.com/blog/2011/11/support-scammers-their-game/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.