VB Blog

Spam is mostly noise and that makes measuring it very difficult

Posted by   Martijn Grooten on   Sep 3, 2018

A brief analysis by Recorded Future suggests that the volume of spam and new domain registrations hasn't increased since the GDPR came into effect.

Read more  

Virus Bulletin announces programme of the first International Threat Intelligence Summit

Posted by   Martijn Grooten on   Aug 29, 2018

VB is thrilled to announce the programme of the first International Threat Intelligence Summit that will form an integral part of the VB2018 conference programme.

Read more  

VB2018 preview: Explain Ethereum smart contract hacking like I am five

Posted by   Martijn Grooten on   Aug 28, 2018

Designing smart contracts is hard: we preview a VB2018 paper on the blockchain-based platform Ethereum, that describes both how the technology works and how a number of security issues inherent to the platform have led to various high-profile and often very costly hacks.

Read more  

VB2017 video: Client Maximus raises the bar

Posted by   Martijn Grooten on   Aug 27, 2018

At VB2017, IBM Trusteer researcher Omer Agmon, presented a 'last-minute' paper in which he analysed the Client Maximum trojan, which targets Brazilian users of online banking. Today, we release the recording of his presentation.

Read more  

The security industry is genuinely willing to help you do good work

Posted by   Martijn Grooten on   Aug 21, 2018

For those organizations working for the public good, security vendors are often willing to offer their services for free, or for very low cost.

Read more  

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

Posted by   Martijn Grooten on   Aug 17, 2018

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

Read more  

VB2018 preview: From drive-by download to drive-by mining

Posted by   Martijn Grooten on   Aug 15, 2018

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Read more  

Red Eyes threat group targets North Korean defectors

Posted by   Martijn Grooten on   Aug 14, 2018

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on North Korea.

Read more  

VB announces Threat Intelligence Summit to take place during VB2018

Posted by   Martijn Grooten on   Aug 9, 2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

Read more  

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

Posted by   Martijn Grooten on   Aug 7, 2018

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

Read more  

Search blog

2011

Latest news from the anti-virus industry provided by independent anti-virus advisors, Virus Bulletin
NewsSpammers using Google open redirectVulnerability 'not worthy of bug bounty program'. 15 December 2011Compromised websites used to mine bitcoinsIn-the-browser botnet turns… https://www.virusbulletin.com/blog/2011/

January

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2011/01/

Hefty Patch Tuesday bulletin rounds off bumper year

No sign of an end to vulnerability glut.
No sign of an end to vulnerability glut.Microsoft released its monthly Patch Tuesday security bulletin yesterday, with details of a hefty 17 alerts covering 40 separate… https://www.virusbulletin.com/blog/2010/12/hefty-patch-tuesday-bulletin-rounds-bumper-year/

Chinese whispers of malware writing and bribery in the industry

As China corruption scandals rumble on, more rumours of malware writers in AV firms surface.
As China corruption scandals rumble on, more rumours of malware writers in AV firms surface. Several recent stories in the media have revolved around China and malware writers,… https://www.virusbulletin.com/blog/2010/12/chinese-whispers-malware-writing-and-bribery-industry/

774,000 Avast! pirates on 14-user licence

Wildly popular free solution not good enough for some.
Wildly popular free solution not good enough for some. Leading provider of free anti-malware products Avast Software has spotted that a single 14-user licence key, issued last… https://www.virusbulletin.com/blog/2010/12/774-000-avast-pirates-14-user-licence/

Russian ATM hackers arrested

Gang used customized malware bought on hacker forum.
Gang used customized malware bought on hacker forum. Police in the Siberian city of Yakutsk have arrested a gang of hackers who had installed malware on ATMs throughout the city.… https://www.virusbulletin.com/blog/2010/12/russian-atm-hackers-arrested/

December issue of VB published

The December issue of Virus Bulletin is now available for subscribers to download.
The December issue of Virus Bulletin is now available for subscribers to download. The December 2010 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2010/12/december-issue-vb-published/

December

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2010/12/

18 months for member of m00p gang

Hacker receives prison sentence.
Hacker receives prison sentence. A Scottish man who pleaded guilty last month to 'causing unauthorized modification to the content of computers' as part of his involvement in the… https://www.virusbulletin.com/blog/2010/11/18-months-member-m00p-gang/

Survey reveals apathy surrounding anti-malware protection

Inconvenient subscription models preventing UK consumers from protecting their PCs adequately.
Inconvenient subscription models preventing UK consumers from protecting their PCs adequately. A survey conducted in the UK by security firm GFI Software has revealed that 40% of… https://www.virusbulletin.com/blog/2010/11/survey-reveals-apathy-surrounding-anti-malware-protection/

Royal engagement search results poisoned

Hackers take the shine off Royal couple's news.
Hackers take the shine off Royal couple's news. It will come as little surprise to those in the IT security industry to hear that within minutes of yesterday's announcement of the… https://www.virusbulletin.com/blog/2010/11/royal-engagement-search-results-poisoned/

Site launched for anonymous sharing of information about security breaches

Verizon aims to foster cooperation and provide more readily available information for risk management.
Verizon aims to foster cooperation and provide more readily available information for risk management. It is well known in the security industry that one of the biggest barriers to… https://www.virusbulletin.com/blog/2010/11/site-launched-anonymous-sharing-information-about-security-breaches/

More than 1 million Chinese phones infected with malware

Mobile botnet sending out SMS spam.
Mobile botnet sending out SMS spam. Over one million mobile phones in China have been infected with malware and are sending out SMS spam, the Shanghai Daily reports. Masquerading… https://www.virusbulletin.com/blog/2010/11/more-1-million-chinese-phones-infected-malware/

Security fixes from Apple and Microsoft

100 security fixes in latest OS X update; three MS security updates in this month's patch release.
100 security fixes in latest OS X update; three MS security updates in this month's patch release. The latest release of Mac operating system OS X (Mac OS X v10.6.5) contains over… https://www.virusbulletin.com/blog/2010/11/security-fixes-apple-and-microsoft/

AVG to acquire DroidSecurity

Security firm set to expand solutions to mobile devices.
Security firm set to expand solutions to mobile devices. Czech security firm AVG has announced the acquisition of Tel Aviv-based DroidSecurity, a specialist in cloud-based… https://www.virusbulletin.com/blog/2010/11/avg-acquire-droidsecurity/

Malicious applications target Orkut

Visitors to infected social network profiles redirected to phishing sites.
Visitors to infected social network profiles redirected to phishing sites. Users of the social networking site Orkut have found themselves targeted by malicious applications that… https://www.virusbulletin.com/blog/2010/11/malicious-applications-target-orkut/

Eight Zeus-related money mules arrested

Arrests in US and Moldova show that cybercriminals aren't immune to the law.
Arrests in US and Moldova show that cybercriminals aren't immune to the law. Police in the US state of Wisconsin have arrested two Moldovan citizens who they believe have worked as… https://www.virusbulletin.com/blog/2010/11/eight-zeus-related-money-mules-arrested/

TrustPort lends support to UNICEF

Season of giving comes early for Czech security firm.
Season of giving comes early for Czech security firm. Czech security firm TrustPort has made a financial donation to international children's charity UNICEF which will enable the… https://www.virusbulletin.com/blog/2010/11/trustport-lends-support-unicef/

Almost three quarters use same password for different sites

User continues to be the weakest link.
User continues to be the weakest link. 73% of computer users use the same password across multiple different accounts according to survey results released by security firm… https://www.virusbulletin.com/blog/2010/11/almost-three-quarters-use-same-password-different-sites/

AV-Test.org unveils latest results

Trend Micro achieves pass; Microsoft and McAfee fail to reach certification standards.
Trend Micro achieves pass; Microsoft and McAfee fail to reach certification standards. Independent testing body AV-Test.org has released its latest set of quarterly test results,… https://www.virusbulletin.com/blog/2010/11/av-test-org-unveils-latest-results/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.