VB Blog

First 11 partners of VB2019 announced

Posted by   Virus Bulletin on   May 15, 2019

We are excited to announce the first 11 companies to partner with VB2019, whose support will help ensure a great event.

Read more  

VB2018 paper: Fake News, Inc.

Posted by   Helen Martin on   Apr 25, 2019

A former reporter by profession, Andrew Brandt's curiosity was piqued when he came across what appeared at first glance to be the website of a small-town newspaper based in Illinois, but under scrutiny, things didn’t add up. At VB2018 he presented a paper in which he shared the results of his investigation of the site. Today, we publish his paper and the recording of his presentation.

Read more  

Paper: Alternative communication channel over NTP

Posted by   Martijn Grooten on   Apr 24, 2019

In a new paper published today, independent researcher Nikolaos Tsapakis writes about the possibilities of malware using NTP as a covert communication channel and how to stop this.

Read more  

VB2019 conference programme announced

Posted by   Martijn Grooten on   Apr 5, 2019

VB is excited to reveal the details of an interesting and diverse programme for VB2019, the 29th Virus Bulletin International Conference, which takes place 2-4 October in London, UK.

Read more  

VB2018 paper: Under the hood - the automotive challenge

Posted by   Martijn Grooten on   Mar 27, 2019

Car hacking has become a hot subject in recent years, and at VB2018 in Montreal, Argus Cyber Security's Inbar Raz presented a paper that provides an introduction to the subject, looking at the complex problem, examples of car hacks, and the challenges ahead. Today, we publish both Inbar's paper and the recording of his presentation.

Read more  

VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation

Posted by   Martijn Grooten on   Mar 20, 2019

Static analysis and dynamic analysis each have their shortcomings as methods for analysing potentially malicious files. Today, we publish a VB2018 paper by Check Point researchers Yoni Moses and Yaniv Mordekhay, in which they describe a method that combines static and dynamic analysis to defeat app obfuscation in Android binaries. We also publish the video of their presentation.

Read more  

VB2019 call for papers closes this weekend

Posted by   Martijn Grooten on   Mar 15, 2019

The call for papers for VB2019 closes on 17 March, and while we've already received many great submissions, we still want more!

Read more  

Registration open for VB2019 ─ book your ticket now!

Posted by   Martijn Grooten on   Mar 13, 2019

Registration for VB2019, the 29th Virus Bulletin International Conference, is now open, with an early bird rate available until 1 July.

Read more  

The VB2019 call for papers is about ... papers

Posted by   Martijn Grooten on   Mar 8, 2019

When we are calling for papers for the Virus Bulletin conference as we are doing now, we really mean a written paper. But don't worry if you've never written a paper - we can help!

Read more  

VB2018 video: Adware is just malware with a legal department - how we reverse engineered OSX/Pirrit, received legal threats, and survived

Posted by   Martijn Grooten on   Mar 8, 2019

Amit Serper first analysed the OSX/Pirrit adware in 2016, highlighting some of its malware-like techniques, and soon afterwards started receiving legal threats from the company behind it. At VB2018 Amit gave a presentation in which he discussed both the adware and the legal threats he received for calling it malware. Today, we publish the video of Amit's presentation.

Read more  

Search blog

Yxe trojan infecting mobile phones

Symbian software-signing slipup certifies SMS spambot.
Symbian software-signing slipup certifies SMS spambot. A new trojan, the first of its kind, is affecting users of the Symbian mobile operating system by spreading itself via text… https://www.virusbulletin.com/blog/2009/07/yxe-trojan-infecting-mobile-phones/

Call for last-minute technical papers

Submissions invited for technical 'turbo' talks at VB Geneva.
Submissions invited for technical 'turbo' talks at VB Geneva. Virus Bulletin is seeking submissions from those wishing to present last-minute technical papers at VB2009. The VB… https://www.virusbulletin.com/blog/2009/07/call-last-minute-technical-papers/

Five botnets responsible for 75% of spam sent

Each infected machine sends spam at rate of almost two messages per second.
Each infected machine sends spam at rate of almost two messages per second.Spam levels have increased 60% since the beginning of this year, according to security company Marshal8e6… https://www.virusbulletin.com/blog/2009/07/five-botnets-responsible-75-spam-sent/

Patch Tuesday brings little relief from browser exploits

Six fixes issued, but new IE zero day emerges along with Firefox flaw.
Six fixes issued, but new IE zero day emerges along with Firefox flaw.Microsoft has issued its monthly 'Patch Tuesday' security update, with some serious browser flaws patched, but… https://www.virusbulletin.com/blog/2009/07/patch-tuesday-brings-little-relief-browser-exploits/

Korea DDoS surge mired in hype and confusion

Rows rumble on over sources and targets of botnet attacks.
Rows rumble on over sources and targets of botnet attacks. Last week's gush of denial-of-service attacks has sparked considerable excitement and argument, with rumours of possible… https://www.virusbulletin.com/blog/2009/07/korea-ddos-surge-mired-hype-and-confusion/

URL shorteners experience surge of popularity among spammers

More than 2.2% of spam contains shortened URLs.
More than 2.2% of spam contains shortened URLs. URL shortening services have proven recently to be popular not just among microbloggers in need of shorter URLs, but also among… https://www.virusbulletin.com/blog/2009/07/url-shorteners-experience-surge-popularity-among-spammers/

Keyloggers used to loot US county

$415,000 sneaked from local government funds.
$415,000 sneaked from local government funds. A Kentucky county has suffered losses of $415,000 after keylogging malware infiltrated its computer systems, allowing cybercriminals… https://www.virusbulletin.com/blog/2009/07/keyloggers-used-loot-us-county/

Serious false positive hits users of old McAfee engines

Batch of system files wrongly flagged as malware, current versions not affected.
Batch of system files wrongly flagged as malware, current versions not affected. An update released by McAfee last week resulted in problems around the world, as some vital system… https://www.virusbulletin.com/blog/2009/07/serious-false-positive-hits-users-old-mcafee-engines/

Another IE zero day exploited

Second DirectShow vulnerability in six weeks labelled 'extremely critical'.
Second DirectShow vulnerability in six weeks labelled 'extremely critical'.Microsoft has issued an advisory on a serious vulnerability in an ActiveX control in its Internet… https://www.virusbulletin.com/blog/2009/07/another-ie-zero-day-exploited/

VB announces latest VBSpam certification results

Two products achieve top level VBSpam Platinum award.
Two products achieve top level VBSpam Platinum award. Virus Bulletin has announced the results of its second comparative review of anti-spam products, revealing two top-level… https://www.virusbulletin.com/blog/2009/07/vb-announces-latest-vbspam-certification-results/

July

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2009/07/

July issue of VB published

The July issue of Virus Bulletin is now available for subscribers to download.
The July issue of Virus Bulletin is now available for subscribers to download. The July 2009 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2009/07/july-issue-vb-published/

DKIM usage shows significant growth

US banks urged to use authentication method
US banks urged to use authentication method In a report on its website, Internet giant Cisco states it has been seeing almost 700,000 non-spam messages that contain valid DKIM… https://www.virusbulletin.com/blog/2009/06/dkim-usage-shows-significant-growth/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2009/06/

Latest AV-Comparatives results released

Retrospective figures follow up February test.
Retrospective figures follow up February test. Independent testing body AV-Comparatives have issued their latest set of retrospective test figures, completing the round of testing… https://www.virusbulletin.com/blog/2009/05/latest-av-comparatives-results-released/

McAfee to acquire Solidcore

Whitelisting firm to be assimilated by security giant.
Whitelisting firm to be assimilated by security giant.McAfee has announced the acquisition of whitelisting firm Solidcore in a deal reported to be worth a base rate of $33 million,… https://www.virusbulletin.com/blog/2009/05/mcafee-acquire-solidcore/

Cyber-security organisations link up to foster collaboration

ASC, NCSA and StopBadware form 'chain of trust' initiative.
ASC, NCSA and StopBadware form 'chain of trust' initiative. Three major groups focused on issues of cyber security - the Anti-Spyware Coalition (ASC), the US National Cyber… https://www.virusbulletin.com/blog/2009/05/cyber-security-organisations-link-foster-collaboration/

AV protection free for aliens

Klingon language scanner given away.
Klingon language scanner given away. After last summer saw malware making its way into space, it seemed like only a matter of time before alien races would need protection from the… https://www.virusbulletin.com/blog/2009/05/av-protection-free-aliens/

Gumblar compromise growth continues

Dominant web threat infecting still more vulnerable sites.
Dominant web threat infecting still more vulnerable sites. A major web compromise, estimated by some to represent over 40% of infected web pages last week, has continued growing in… https://www.virusbulletin.com/blog/2009/05/gumblar-compromise-growth-continues/

Security experts pool ideas at European conferences

Research and expertise shared at CARO and AMTSO meetings.
Research and expertise shared at CARO and AMTSO meetings. Last week saw two major gatherings of top security and anti-malware experts from across the globe, as the third annual… https://www.virusbulletin.com/blog/2009/05/security-experts-pool-ideas-european-conferences/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.